Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
JetBrains.dotPeek.2024.1.1.web.exe
Resource
win10v2004-20240412-en
Target
JetBrains.dotPeek.2024.1.1.web.exe
Size
51.0MB
MD5
937e1e30ea7bd4aa80b04fa23cabe837
SHA1
38c0f657b05911f5e4c547137478465eb41d41f3
SHA256
3cd8ec95ffe8b0591beb648584d025681b5ff488c9a19ea6d94f200c71b46296
SHA512
a9ffb2db2446b1fa19bc945a0d003b4fc028b2371b1113fc5fcc958c4415a51d84d1887b32427751738bf497621000e3969ff2beda0e032990a27c7c14f0b392
SSDEEP
1572864:+sruQYtpNHyqREPaSPxxm8ZQHc+NpVyLYJ:LruQYTNSqs3S8ZQHciVyL6
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
CreateProcessW
CreateFileW
SetFilePointer
WriteFile
GetTempPathW
GetFileAttributesW
GetModuleFileNameW
GetCurrentDirectoryW
FindResourceW
LoadResource
LockResource
SizeofResource
LocalFree
VerifyVersionInfoW
VerSetConditionMask
FreeLibrary
SetErrorMode
FormatMessageW
WriteConsoleW
FlushConsoleInputBuffer
WaitForSingleObject
PeekConsoleInputW
ReadConsoleInputW
GetStdHandle
GetConsoleMode
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentThreadId
CreateThread
InitializeCriticalSectionAndSpinCount
TerminateProcess
DecodePointer
DeleteCriticalSection
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapSize
GetProcessHeap
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetModuleHandleExW
ExitProcess
HeapFree
HeapReAlloc
HeapAlloc
Module32NextW
Module32FirstW
CreateToolhelp32Snapshot
CloseHandle
SetSearchPathMode
SetDllDirectoryW
GetSystemDirectoryW
LoadLibraryW
LoadLibraryExW
GetProcAddress
GetModuleHandleW
CompareStringW
GetLastError
InterlockedIncrement
RaiseException
InterlockedDecrement
GetCommandLineW
GetCommandLineA
RtlUnwind
InitializeSListHead
GetCurrentProcessId
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
OutputDebugStringW
IsDebuggerPresent
GetCPInfo
GetLocaleInfoW
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
Sleep
SetLastError
EncodePointer
GetStringTypeW
WideCharToMultiByte
MultiByteToWideChar
MonitorFromPoint
GetMonitorInfoW
GetProcessWindowStation
GetSystemMetrics
PostThreadMessageW
MessageBoxW
TranslateMessage
DispatchMessageW
SetTimer
LoadCursorW
GetUserObjectInformationW
GetCursorInfo
GetMessageW
LoadIconW
DestroyWindow
GetGUIThreadInfo
KillTimer
DefWindowProcW
GetWindowLongW
SetWindowLongW
GetAncestor
IsWindowVisible
EnumThreadWindows
SetWindowPos
UpdateLayeredWindow
CreateWindowExW
RegisterClassExW
IsWindow
CreateCompatibleDC
DeleteObject
CreateDIBSection
DeleteDC
GetDeviceCaps
CreateDCW
SelectObject
RegQueryValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
ShellExecuteW
CoInitializeEx
CoCreateInstance
SysAllocString
SysFreeString
SysAllocStringByteLen
SysStringLen
VariantChangeType
VariantClear
VariantInit
SysStringByteLen
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopyInd
CreateErrorInfo
GetErrorInfo
SafeArrayRedim
SafeArrayUnlock
SafeArrayCopy
SafeArrayLock
SafeArrayCreate
SafeArrayDestroy
SafeArrayGetVartype
SetErrorInfo
GdipCloneBrush
GdipCreateSolidFill
GdipCreateHatchBrush
GdipCreateFromHDC
GdipAlloc
GdiplusShutdown
GdipDeleteBrush
GdipFillRectangleI
GdipDeleteGraphics
GdipFree
GdiplusStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ