Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
c4de53bc3a35169f0d5331a3634f1f0e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4de53bc3a35169f0d5331a3634f1f0e.exe
Resource
win10v2004-20240226-en
Target
c4de53bc3a35169f0d5331a3634f1f0e
Size
1.9MB
MD5
c4de53bc3a35169f0d5331a3634f1f0e
SHA1
45dac702b6453574077f142ffc5b50f83abfcd6b
SHA256
12490cd51779cd31b376046d2726f51dbeeebdaaca1ce768f9e5731acd3a33b8
SHA512
7d5792694c264172f1e8e713226835d258493aa33c44620b216ce9464b322a31c6385fe0568581df6b93dd8099e2bbf83257cbfc768b50f98854d2194e317d0b
SSDEEP
49152:sAYWXXnyZF/EvzXGG/bpJIpSRmT6Uzn+nPRxm:tXiZFMbGqBu
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
InternetOpenW
InternetConnectW
InternetReadFile
InternetSetOptionW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
Process32FirstW
Process32NextW
GetFileSize
GetFileSizeEx
WriteFile
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
FindClose
GetSystemTimeAsFileTime
LoadLibraryW
CreateDirectoryW
GetFileAttributesW
FindFirstFileW
WaitForSingleObject
CreateMutexW
OpenMutexW
LocalFree
GetCurrentProcess
FreeLibrary
TerminateProcess
LoadLibraryA
GetVersion
LockFile
UnlockFile
LockFileEx
GetSystemTime
TlsAlloc
TlsGetValue
TlsSetValue
GetTempPathA
GetFullPathNameA
GetFullPathNameW
CreateFileA
GetFileAttributesA
DeleteFileA
DeleteFileW
AreFileApisANSI
InterlockedIncrement
InterlockedDecrement
GlobalAlloc
GlobalLock
GlobalUnlock
FlushInstructionCache
RaiseException
GetCurrentThreadId
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MulDiv
lstrcmpW
GetDiskFreeSpaceW
FileTimeToSystemTime
DosDateTimeToFileTime
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
CopyFileW
GlobalHandle
GlobalFree
lstrcmpiW
CreateToolhelp32Snapshot
GetSystemDirectoryW
GetVolumeInformationW
GetComputerNameW
GetStdHandle
QueryPerformanceCounter
GlobalMemoryStatus
GetVersionExA
FlushConsoleInputBuffer
GetConsoleMode
SetConsoleCtrlHandler
GetCommandLineW
ExitThread
CreateThread
GetModuleHandleExW
ExitProcess
IsDebuggerPresent
GetCPInfo
RtlUnwind
EncodePointer
GetStringTypeW
DecodePointer
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExW
TlsFree
GetStartupInfoW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetConsoleCP
SetFilePointerEx
GetTempPathW
FindResourceExW
FindResourceW
GetModuleHandleW
GetModuleFileNameW
GetMailslotInfo
PeekNamedPipe
GetTickCount
CloseHandle
GetFileType
SizeofResource
LoadResource
Sleep
GetLastError
OpenThread
OpenProcess
LockResource
InitializeCriticalSectionAndSpinCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleHandleA
SetLastError
GetCurrentProcessId
GetProcessHeap
HeapFree
HeapAlloc
GetTimeZoneInformation
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
FindNextFileW
LoadLibraryExW
CreateFileW
ReadConsoleW
SetStdHandle
OutputDebugStringW
WriteConsoleW
SetEnvironmentVariableA
ReadConsoleInputA
SetConsoleMode
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EndPaint
BeginPaint
ReleaseDC
GetDC
DestroyAcceleratorTable
CreateAcceleratorTableW
SetTimer
ReleaseCapture
SetCapture
GetFocus
CharNextW
SendDlgItemMessageW
ClientToScreen
ScreenToClient
GetSysColor
FillRect
GetWindowLongW
SetWindowLongW
GetClassNameW
GetWindow
LoadCursorW
MapDialogRect
DialogBoxIndirectParamW
InvalidateRect
InvalidateRgn
RedrawWindow
EndDialog
SetWindowPos
SetWindowTextW
GetWindowTextLengthW
GetClientRect
MoveWindow
DestroyWindow
IsChild
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
RegisterWindowMessageW
EnumWindows
GetWindowThreadProcessId
GetParent
GetDesktopWindow
GetWindowTextW
SetFocus
PostMessageW
SendMessageW
UnregisterClassW
GetActiveWindow
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxA
SetWindowContextHelpId
GetDlgItem
GetObjectW
SelectObject
GetStockObject
GetDeviceCaps
DeleteDC
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteObject
RegSetValueW
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteValueW
RegQueryInfoKeyW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptImportKey
LookupAccountNameW
ConvertSidToStringSidW
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
DeregisterEventSource
ReportEventA
RegisterEventSourceA
SHGetFolderPathW
SHFileOperationW
ShellExecuteExW
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
StringFromGUID2
CoTaskMemAlloc
OleInitialize
OleLockRunning
OleUninitialize
CreateStreamOnHGlobal
CoTaskMemRealloc
LoadRegTypeLi
VarUI4FromStr
OleCreateFontIndirect
LoadTypeLi
VariantClear
VariantInit
SysStringLen
SysAllocStringLen
SysAllocString
SysFreeString
SHCopyKeyW
UrlEscapeW
InitCommonControlsEx
GetProcessImageFileNameW
EnumProcesses
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ