Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
atieah32.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
atieah32.exe
Resource
win10v2004-20240508-en
Target
atieah32.exe
Size
387KB
MD5
6f5aa53f64417126e3d3ca958e44cb30
SHA1
6e18ca8c0d849d78c4921cfefc3fa1f1d990e130
SHA256
acd03a3fbf6f965d93c843b0be42cf641405599748a998070dd9817b57392ca8
SHA512
890de3717ea898ff68ffb7553f9e92c5b6a0983c27632995296be0c5fa1c7433ae4274554df6d74512ccdb9de6436186c6b8e35e8ae6851101c678942b42dcc1
SSDEEP
6144:zM/OX2k+3rSvYlpcGE+VFBrSZ37qFkVTXBkr:gmx+bS7GEWBrZFOXBy
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\constructicon\builds\gfx\three\23.30\drivers\2d\dal\eeu\atieah\build\wNow\B_rel\atieah32.pdb
VerQueryValueA
GetFileVersionInfoW
GetFileVersionInfoSizeW
DecodePointer
ReadConsoleW
ExpandEnvironmentStringsA
GetFileAttributesA
CloseHandle
OpenProcess
GetModuleHandleA
GetProcAddress
QueryFullProcessImageNameW
GetCommandLineA
QueryPerformanceCounter
CreateFileW
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
ReadFile
GetCurrentProcessId
LoadLibraryExW
GetLastError
ResumeThread
CreateProcessA
CreateProcessW
VirtualAllocEx
VirtualProtectEx
VirtualQueryEx
ReadProcessMemory
WriteProcessMemory
SetLastError
VirtualProtect
VirtualQuery
FreeLibrary
LoadLibraryA
InterlockedPushEntrySList
InterlockedFlushSList
RaiseException
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
WriteConsoleW
EncodePointer
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCurrentThread
WideCharToMultiByte
HeapFree
HeapAlloc
GetFileType
OutputDebugStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineW
MultiByteToWideChar
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTempPathW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
IsThreadAFiber
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetProcessHeap
SetConsoleCtrlHandler
GetFileSizeEx
SetFilePointerEx
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
RegGetValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ