Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
c162b4116b69b0dd44cc25c1ccdaae76.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c162b4116b69b0dd44cc25c1ccdaae76.exe
Resource
win10v2004-20240226-en
Target
c162b4116b69b0dd44cc25c1ccdaae76
Size
1.2MB
MD5
c162b4116b69b0dd44cc25c1ccdaae76
SHA1
bb955c511c0bc0e66f4e78ffb9b19c743f20d708
SHA256
108f654ff463240705d68aebf24fdd2b8458e3fda5ed4db47cff926adb5bab35
SHA512
0af03cccfe49e70c7609a24527a909ab3ddc87ddc9662855f58c6b963e6be93c01b6754aea98649f4f6fa2693c206d00a7801e408450ba5a189883001c030e56
SSDEEP
24576:2DwskD0Dc02saSjBTcOLtfn4ndpw+u3XZIv5ieTgtBUUqn:2DwsjcOZfCdpwnZE0jZq
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindFirstFileExW
DeleteFileW
MoveFileExW
FindNextFileW
FindClose
RemoveDirectoryW
lstrcmpiW
CopyFileW
CreateToolhelp32Snapshot
Process32FirstW
GetCurrentProcess
OpenProcess
SetLastError
TerminateProcess
Process32NextW
GetLastError
LocalFree
GetTempPathW
GetTempFileNameW
WriteFile
GetSystemDirectoryW
LocalAlloc
WideCharToMultiByte
MultiByteToWideChar
SetEndOfFile
LCMapStringW
CloseHandle
HeapSize
GetStringTypeW
OutputDebugStringW
HeapReAlloc
FindResourceW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
GetFileType
GetStdHandle
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleExW
CreateProcessW
InterlockedDecrement
InterlockedIncrement
FreeResource
SizeofResource
LockResource
LoadResource
GetSystemTime
GetPrivateProfileStringW
lstrlenW
CreateFileW
lstrcpyW
WritePrivateProfileStringW
GetExitCodeThread
WaitForSingleObject
Sleep
CreateDirectoryW
GetVersionExW
LoadLibraryW
FreeLibrary
lstrcpynW
GetModuleHandleW
GetModuleFileNameW
OpenMutexW
lstrcmpW
ExitProcess
GetConsoleMode
GetConsoleCP
RtlUnwind
GetProcessHeap
RaiseException
IsProcessorFeaturePresent
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
GetCommandLineW
lstrcatW
GetSystemTimeAsFileTime
HeapAlloc
LoadLibraryExW
GetProcAddress
ExitThread
GetCurrentThreadId
CreateThread
DecodePointer
EncodePointer
HeapFree
ReadFile
SetFileAttributesW
AreFileApisANSI
CreateFileA
SetFilePointer
ReadConsoleW
PostMessageW
LoadBitmapW
GetClientRect
CreateWindowExW
SendMessageW
SetWindowTextW
FillRect
DrawIcon
GetWindowTextW
GetSysColor
GetWindowRect
GetSystemMetrics
LoadIconW
SetWindowPos
LoadStringW
SetWindowTextA
GetSysColorBrush
PostQuitMessage
MessageBoxW
SetTimer
KillTimer
GetDesktopWindow
DispatchMessageW
TranslateMessage
wsprintfW
GetMessageW
GetFocus
FindWindowExW
GetParent
GetClassNameW
SetFocus
EnableWindow
LoadCursorW
SetWindowLongW
EndPaint
BeginPaint
DefWindowProcW
GetWindowLongW
RegisterClassExW
UpdateWindow
ShowWindow
GetStockObject
GetObjectW
DeleteDC
StretchBlt
SelectObject
CreateCompatibleDC
CreateFontIndirectW
RegSetValueExW
GetUserNameW
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegCreateKeyExW
SHGetFileInfoW
SHGetDesktopFolder
ExtractIconW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
CoUninitialize
CoCreateInstance
CoInitialize
InitCommonControlsEx
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
StrRChrIW
StrStrIW
PathFileExistsW
StrStrIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ