Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
990803c15c5f42bdf81e7e8a0344d8ad08d6628ef06841b10fa0dd2697e1194b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
990803c15c5f42bdf81e7e8a0344d8ad08d6628ef06841b10fa0dd2697e1194b.exe
Resource
win10v2004-20240508-en
Target
990803c15c5f42bdf81e7e8a0344d8ad08d6628ef06841b10fa0dd2697e1194b
Size
46.3MB
MD5
f6a8dca61c984137f9df99826747caca
SHA1
dba1c4a8ad77fb6afd47f4b98a6e10b5e2bcc785
SHA256
990803c15c5f42bdf81e7e8a0344d8ad08d6628ef06841b10fa0dd2697e1194b
SHA512
b230e1c6d91c3749fa15a30595b7172303e5b2bc01febab52018e08872da28952b67788f8e911cc9141bb70d8fc2485d36fb81c24b04621a3ce5860caac0edc0
SSDEEP
786432:SMEnRtpu84z8+IElBn5ydGZpM+NaW041cAySCq8j21XntkNGQjkqWJWqfetxTwBp:3+LWbIED5yIZfNaWsW1oGskfoqGtxTvY
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\tmp\squirrel\-1240161847\src\Setup\bin\Release\Setup.pdb
InitializeCriticalSectionAndSpinCount
FreeResource
LoadResource
FindResourceW
SizeofResource
LockResource
CreateDirectoryW
LocalFree
CopyFileW
GetFileAttributesW
CreateFileW
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
WideCharToMultiByte
WriteFile
SetFileTime
CreateProcessW
lstrcmpiW
LeaveCriticalSection
RaiseException
EnterCriticalSection
LoadLibraryExW
GetCurrentThreadId
DecodePointer
FreeLibrary
SetEndOfFile
LCMapStringW
CompareStringW
LoadLibraryW
GetCurrentProcess
GetModuleFileNameW
DeleteFileW
CloseHandle
GetExitCodeProcess
WaitForSingleObject
MoveFileW
GetTempFileNameW
GetLastError
GetTempPathW
lstrlenW
DeleteCriticalSection
GetModuleHandleW
GetProcAddress
VerSetConditionMask
WriteConsoleW
SetStdHandle
GetStringTypeW
ReadConsoleW
SetEnvironmentVariableA
SetFilePointerEx
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetConsoleMode
GetConsoleCP
GetCPInfo
GetOEMCP
GetACP
OutputDebugStringW
VerifyVersionInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
EncodePointer
GetCommandLineW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetStdHandle
GetFileType
ExitProcess
GetModuleHandleExW
AreFileApisANSI
RtlUnwind
GetProcessHeap
HeapSize
HeapReAlloc
IsValidCodePage
CharNextW
DestroyWindow
LoadStringW
ExitWindowsEx
GetActiveWindow
MessageBoxW
wsprintfW
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
GetTokenInformation
GetUserNameW
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
VariantInit
VarUI4FromStr
SysFreeString
SysAllocString
VariantClear
URLDownloadToFileW
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ