Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
0709a8f18c8436deea0b57deab55afbcea17657cb0186cbf0f6fcbb551661470.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0709a8f18c8436deea0b57deab55afbcea17657cb0186cbf0f6fcbb551661470.exe
Resource
win10v2004-20240226-en
Target
0709a8f18c8436deea0b57deab55afbcea17657cb0186cbf0f6fcbb551661470
Size
1.7MB
MD5
d25e91832f81fee791658810a9db28e3
SHA1
881e4862d250745f6da3608040d9e123eb33f596
SHA256
0709a8f18c8436deea0b57deab55afbcea17657cb0186cbf0f6fcbb551661470
SHA512
5687348d2ed0e6621eba64e5099f32bf53145fe3218268b890d659d458e83551a4de40d68c84b7509c9a76909813db949e5a0cd7c8650083a540f12d83bc4027
SSDEEP
49152:vKaKw81IuaSxhuTu8UYdHy0vXjsGKJridC:vKavDSxhuTlA0oHJedC
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
AddAtomA
AddVectoredExceptionHandler
AreFileApisANSI
CloseHandle
CopyFileExW
CreateDirectoryExW
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreatePipe
CreateProcessA
CreateSemaphoreA
CreateWaitableTimerA
DeleteAtom
DeleteCriticalSection
DeleteFileW
DeviceIoControl
DuplicateHandle
EnterCriticalSection
FindClose
FindFirstFileW
FindNextFileW
FindResourceA
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeLibrary
GetComputerNameA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceExW
GetEnvironmentVariableW
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
GetHandleInformation
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetProcessHeap
GetStartupInfoA
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadContext
GetThreadPriority
GetTickCount
GetVolumeInformationA
GetWindowsDirectoryW
HeapAlloc
HeapFree
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalFree
LockResource
MoveFileExW
MultiByteToWideChar
OpenEventA
OpenProcess
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReleaseSemaphore
RemoveDirectoryW
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
SetCurrentDirectoryW
SetEndOfFile
SetEvent
SetFileAttributesW
SetFilePointerEx
SetFileTime
SetHandleInformation
SetLastError
SetProcessAffinityMask
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
SizeofResource
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForMultipleObjectsEx
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
WriteFile
__getmainargs
__initenv
__lconv_init
__mb_cur_max
__p__acmdln
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_amsg_exit
_beginthreadex
_cexit
_endthreadex
_errno
_filelengthi64
_fileno
_fstat64
_initterm
_iob
_lseeki64
_onexit
_setjmp3
_ultoa
_wfopen
abort
atoi
calloc
exit
fclose
fflush
fgetpos
fopen
fprintf
fputc
fputs
fread
free
fsetpos
fwrite
getc
getwc
isspace
iswctype
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
printf
putc
putwc
realloc
setlocale
setvbuf
signal
strchr
strcmp
strcoll
strerror
strftime
strlen
strncmp
strncpy
strxfrm
towlower
towupper
ungetc
ungetwc
vfprintf
_strnicmp
wcscoll
wcsftime
wcslen
wcsxfrm
longjmp
_write
_strdup
_read
_fileno
_fdopen
_close
AnyPopup
CloseWindow
CreateWindowExA
GetCapture
ShowWindow
WSACleanup
WSAStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE