Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
https.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https.exe
Resource
win10v2004-20240412-en
Target
https.exe
Size
7.8MB
MD5
20eb48837cd9b4c268f029f1858531fc
SHA1
78e9b2eb5ebcbcc2c49b07fd6be3873486816eec
SHA256
868ffbf7370351a40100f2cfc6b321de6ae7c42c61be535f46e4df745004e701
SHA512
1f6e41e7d012481fd90947c1ec4832ca307fa9d7d26e10f9911f320ae0f347398c6cdf11d4655b82567ffd6903131350143039890aaa0f9dbc9cb526ac1c6470
SSDEEP
12288:zIbz+6nIf54uI2eW8bK4nNUVzbbJEeKewqtbSwzFLK/3dFvYqqxsd0LuZ:8yw+5t6K4nN8TXbScB4hYDO5
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CloseHandle
HeapAlloc
HeapFree
GetProcessHeap
LocalAlloc
LocalFree
ReadFile
WriteFile
PeekNamedPipe
Sleep
TerminateProcess
GetExitCodeProcess
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetModuleFileNameW
MultiByteToWideChar
CreateFileW
GetDiskFreeSpaceExW
GetProcessTimes
OpenProcess
GetSystemTime
lstrcmpW
GetCurrentThreadId
VirtualFree
VirtualProtect
GetProcAddress
LoadLibraryA
AddVectoredExceptionHandler
WideCharToMultiByte
FlushFileBuffers
SetHandleInformation
CreatePipe
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
LoadResource
LockResource
SizeofResource
FindResourceW
WaitForSingleObject
CreateEventA
SetWaitableTimer
CreateWaitableTimerW
WriteConsoleW
HeapSize
SetStdHandle
TerminateThread
GetComputerNameW
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
WaitForSingleObjectEx
GetExitCodeThread
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
QueryPerformanceCounter
WakeAllConditionVariable
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
GetModuleHandleW
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetFullPathNameW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetDriveTypeW
GetFileType
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
RtlUnwind
GetCursorPos
LogonUserExW
GetSidSubAuthorityCount
CoCreateGuid
CoInitializeEx
SafeArrayPutElement
SafeArrayDestroy
SafeArrayCreate
timeBeginPeriod
timeEndPeriod
timeGetDevCaps
CLRCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ