Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
af48f5f3dad69a667accecd6c9c12f86.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
af48f5f3dad69a667accecd6c9c12f86.exe
Resource
win10v2004-20240226-en
Target
af48f5f3dad69a667accecd6c9c12f86
Size
603KB
MD5
af48f5f3dad69a667accecd6c9c12f86
SHA1
6b55cca1dc73758b15d022b2cd816c641d25defa
SHA256
922c83f2e572dc573347826d66ea1d9fcd4e1b7ec3359713c20e1958af26e8b7
SHA512
75c4ab2813952d8c6abe565b23f79bd98ead16ff4c5810aba0e0b99b5f802d56e750e67a696a10339a641f4ae915f20702b587db4bdb7625213a1460155e4a51
SSDEEP
12288:7XfGdZgSFyfmjyNywcnuqj07lzcMW0rwrsu:7vGf8mTwcnu1Jch3
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\pasugiciguf\sanolagurijoda\natala31_gapiw.pdb
ExitProcess
GetVolumeNameForVolumeMountPointA
GetCommandLineW
SetVolumeLabelA
GetFileSize
CreateMutexW
SearchPathW
WriteConsoleInputW
WritePrivateProfileStructA
GetConsoleAliasesLengthW
CopyFileExW
GetProfileIntW
GetDefaultCommConfigW
LoadResource
InterlockedIncrement
InterlockedDecrement
ZombifyActCtx
ScrollConsoleScreenBufferW
GetNamedPipeHandleStateA
CreateDirectoryW
GetProfileSectionA
GetComputerNameW
GetCommProperties
FreeEnvironmentStringsA
GetProcessPriorityBoost
GetConsoleTitleA
GetWindowsDirectoryA
WriteFile
SetCommState
EnumResourceTypesA
CreateDirectoryExW
TlsSetValue
FindResourceExA
GlobalAlloc
LoadLibraryW
GetConsoleMode
SizeofResource
GetCalendarInfoA
ReadFileScatter
GetSystemWow64DirectoryW
SetSystemTimeAdjustment
GetSystemWindowsDirectoryA
GetVersionExW
GlobalFlags
SetConsoleCursorPosition
VerifyVersionInfoA
GetBinaryTypeA
GetAtomNameW
IsDBCSLeadByte
GetOverlappedResult
CompareStringW
lstrlenW
SetConsoleTitleA
GlobalUnlock
GetConsoleOutputCP
InterlockedExchange
SetCurrentDirectoryA
SetThreadLocale
FreeUserPhysicalPages
SetComputerNameA
EnterCriticalSection
GetPrivateProfileStringA
OpenWaitableTimerA
GetLocalTime
LoadLibraryA
IsSystemResumeAutomatic
SetConsoleCtrlHandler
SetFileApisToANSI
WriteProfileSectionW
SetConsoleWindowInfo
FindAtomA
GetTapeParameters
WTSGetActiveConsoleSessionId
SetConsoleCursorInfo
GetModuleHandleA
VirtualProtect
GetCurrentDirectoryA
CompareStringA
GetConsoleCursorInfo
SetThreadAffinityMask
WriteFileEx
FileTimeToLocalFileTime
InterlockedPushEntrySList
LCMapStringW
DeleteFileA
FlushFileBuffers
CloseHandle
GetLastError
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RtlUnwind
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
GetProcAddress
TlsGetValue
GetModuleHandleW
TlsAlloc
GetCurrentThreadId
TlsFree
SetLastError
DeleteCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LCMapStringA
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
SetStdHandle
WriteConsoleA
CreateFileA
GetMenuInfo
GetMessageTime
GetMenuCheckMarkDimensions
_CallPattern@8
_zabiray@8
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ