Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe
Resource
win7-20240221-en
Target
5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1
Size
1.3MB
MD5
029121f4c1fc507eee2da7ef0f81c52f
SHA1
5bdfc541991da167e6fb256a64e05e05f92fc5db
SHA256
5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1
SHA512
94e38cc00fcbc431da0300eba6683f251e0b4c4ca71cc88d941acf998207d3df14b59322d9d59d5522649c80f26689fa1a44ad59371eeafcd4107c9dd42d3e2f
SSDEEP
24576:GP2e+mt0BUefY1OOz6KgoHPLVGdbiCu4SMZ4QU:89EfG3s28vuWg
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
VirtualAllocEx
GetShellWindow
IsWindowVisible
GetKeyboardType
CharUpperA
GetKBCodePage
WindowFromDC
CharUpperW
GetDialogBaseUnits
OemKeyScan
GetWindowTextLengthA
GetMenuContextHelpId
GetWindowDC
CharNextW
GetThreadDesktop
PaintDesktop
ShowCaret
EndMenu
IsCharAlphaNumericW
IsCharLowerA
CloseClipboard
GetListBoxInfo
GetMenuCheckMarkDimensions
GetClipboardOwner
GetDoubleClickTime
GetWindowContextHelpId
GetLastActivePopup
EnumClipboardFormats
CloseWindowStation
GetMessageExtraInfo
IsWindowEnabled
IsGUIThread
GetInputState
GetKeyState
GetClipboardSequenceNumber
DestroyIcon
IsCharAlphaNumericA
GetClipboardData
GetActiveWindow
IsMenu
IsWindowUnicode
GetTopWindow
CreateMenu
IsCharUpperW
CharLowerA
GetFocus
GetKeyboardLayout
GetOpenClipboardWindow
GetMenu
InSendMessage
LoadCursorFromFileA
GetMessagePos
DeleteColorSpace
RealizePalette
AddFontResourceW
CreatePatternBrush
FillPath
EndPage
CreateHalftonePalette
GetSystemPaletteUse
AddFontResourceA
GetBkMode
CreateSolidBrush
CloseEnhMetaFile
GetEnhMetaFileW
DeleteObject
GetMapMode
SwapBuffers
GetPolyFillMode
GetColorSpace
GetROP2
GetLayout
GetTextCharacterExtra
GetEnhMetaFileA
CloseMetaFile
GetTextCharset
RegOpenKeyExW
RegQueryValueExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ