Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
idea64.exe
Resource
win11-20240214-en
Target
idea64.exe
Size
929KB
MD5
a1133999f7460917eb8fec319a983ab3
SHA1
b45f3698b47d9b8f97b0ea5f821b39a2e248473a
SHA256
2a8ee92909f51fb912652292ca221b3835f4b8f89f2a330704c4cdebe50e7594
SHA512
5e81b2bd0fa0a550670053b336563f2da420dd9d6767105d4c822f9b3bfa31f00d342ccbf00e2b0d9ccd9bdb8120f75ff933a2a048338b440b35451ea53de956
SSDEEP
24576:Z5v5PtTiAC60dYJHcyLXTh8zEMX5r4uX7Qp:Z5v5PtTiA3Hz98zviF
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
%%%WinLauncher.pdb%%%
RevertToSelf
RegDisablePredefinedCache
RegOpenKeyExW
RegCloseKey
IsValidSid
GetLengthSid
ConvertStringSidToSidW
ConvertSidToStringSidW
EqualSid
CreateProcessAsUserW
SetThreadToken
GetTokenInformation
OpenProcessToken
DuplicateTokenEx
SetTokenInformation
LookupPrivilegeValueW
CreateRestrictedToken
AdjustTokenPrivileges
FreeSid
ImpersonateLoggedOnUser
GetAce
RegCreateKeyExW
RegQueryValueExW
SystemFunction036
IsValidSecurityDescriptor
GetSecurityDescriptorControl
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
GetNamedSecurityInfoW
GetSecurityInfo
SetSecurityInfo
MapGenericMask
AccessCheck
IsValidAcl
InitializeAcl
AddMandatoryAce
BuildTrusteeWithSidW
SetEntriesInAclW
SymGetLineFromAddr64
SymFromAddr
SymCleanup
SymSetOptions
SymGetSearchPathW
SymSetSearchPathW
SymInitialize
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureStackBackTrace
RtlInitUnicodeString
RtlUnwindEx
RtlPcToFileHeader
RtlCaptureContext
RtlUnwind
CommandLineToArgvW
SHGetKnownFolderPath
CreateAppContainerProfile
DeriveAppContainerSidFromAppContainerName
GetAppContainerRegistryLocation
GetAppContainerFolderPath
timeGetTime
GetProcessHeap
GetOEMCP
IsValidCodePage
HeapSize
ReadConsoleW
HeapReAlloc
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
HeapFree
HeapAlloc
GetACP
GetStdHandle
SetStdHandle
ExitProcess
GetConsoleMode
GetConsoleCP
GetCommandLineA
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetStringTypeW
LCMapStringEx
DecodePointer
EncodePointer
GetModuleFileNameA
GetCommandLineW
ExpandEnvironmentStringsW
GetModuleFileNameW
SetEnvironmentVariableW
ExpandEnvironmentStringsA
GetEnvironmentVariableW
GetEnvironmentVariableA
WaitForSingleObject
UnmapViewOfFile
SetCurrentDirectoryA
GetLastError
GetFileAttributesA
SetEvent
LoadLibraryA
CloseHandle
CreateThread
GetCurrentDirectoryW
GetProcAddress
CreateFileMappingA
GetCurrentProcessId
FreeLibrary
WideCharToMultiByte
OpenFileMappingA
CreateEventA
MapViewOfFile
SetDllDirectoryW
CreateIoCompletionPort
CreateEventW
SetLastError
ResetEvent
GetQueuedCompletionStatus
RegisterWaitForSingleObject
UnregisterWait
TerminateJobObject
PostQueuedCompletionStatus
GetModuleHandleExW
SetInformationJobObject
GetCurrentProcess
DuplicateHandle
GetCurrentThreadId
TerminateProcess
GetUserDefaultLangID
GetUserDefaultLCID
GetUserDefaultLocaleName
EnumSystemLocalesEx
HeapDestroy
GetTickCount
CreateFileW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
UnregisterWaitEx
GetCurrentThread
Sleep
IsDebuggerPresent
RaiseException
GetModuleHandleW
GetThreadId
GetFileType
SetHandleInformation
SetDefaultDllDirectories
HeapSetInformation
SetThreadInformation
GetProcessMitigationPolicy
SetProcessMitigationPolicy
GetVersionExW
GetProductInfo
GetNativeSystemInfo
IsWow64Process
LocalFree
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteProcessMemory
CreateFileMappingW
ReadProcessMemory
GetCurrentProcessorNumber
SetThreadAffinityMask
VirtualFree
GetProcessHeaps
LoadLibraryExW
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
CreateNamedPipeW
CreateJobObjectW
QueryInformationJobObject
VirtualAllocEx
VirtualProtectEx
GetModuleHandleA
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
CreateMutexW
GetFileAttributesW
QueryDosDeviceW
GetLongPathNameW
VirtualFreeEx
GetProcessHandleCount
SetUnhandledExceptionFilter
TlsGetValue
DebugBreak
TlsAlloc
TlsFree
TlsSetValue
SetFilePointerEx
ReadFile
SetEndOfFile
FlushFileBuffers
CreateRemoteThread
MultiByteToWideChar
FindClose
FindNextFileW
FindFirstFileExW
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
CreateDesktopW
SetProcessWindowStation
CreateWindowStationW
GetProcessWindowStation
GetThreadDesktop
CloseWindowStation
CloseDesktop
LoadStringA
LoadStringW
MessageBoxA
AllowSetForegroundWindow
GetUserObjectInformationW
MessageBoxW
CoTaskMemFree
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ