Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
c08971904d6a537da4e25c4033591be4ed166fa29b93f63d10d6026f9b8df8bd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c08971904d6a537da4e25c4033591be4ed166fa29b93f63d10d6026f9b8df8bd.exe
Resource
win10v2004-20240802-en
Target
c08971904d6a537da4e25c4033591be4ed166fa29b93f63d10d6026f9b8df8bd
Size
2.7MB
MD5
b66986031c1e1e8430b9c20be73fa8cd
SHA1
7993e743437c55b9ad669db6c642cf604122f3d3
SHA256
c08971904d6a537da4e25c4033591be4ed166fa29b93f63d10d6026f9b8df8bd
SHA512
bb2f83b12e4f4d62adff34614c6a89e0b6866e58d359af140a3cc2cb71b11498f20e54f36ee5e01d7068dd1987d3fef643bcacd3c6b0e0d0307dbb3732bc8f25
SSDEEP
49152:TGsWHXechxxMKou3Sjd140gihhMP+W70cjib1FZTe:TYHX5hxxbou6sYjW7L
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DestroyEnvironmentBlock
CreateEnvironmentBlock
LeaveCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
CreateEventW
GetLocalTime
GetLastError
GetFullPathNameW
GetCurrentDirectoryW
IsBadReadPtr
LoadLibraryA
lstrlenW
GetNativeSystemInfo
SetLastError
GetProcessHeap
HeapFree
HeapAlloc
VirtualProtect
VirtualFree
VirtualAlloc
WritePrivateProfileStringW
GetPrivateProfileStringW
Process32NextW
EnterCriticalSection
FreeLibraryAndExitThread
ExitThread
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
SystemTimeToFileTime
GetSystemTime
ReadConsoleA
SetConsoleMode
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
GetVersionExW
LocalAlloc
LocalFree
GetCurrentProcess
GetModuleFileNameW
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetPrivateProfileIntW
GetEnvironmentVariableW
GetTempPathW
CreateDirectoryW
RemoveDirectoryW
Process32FirstW
MoveFileExW
GlobalAlloc
GlobalFree
GetExitCodeProcess
CreateProcessW
InitializeCriticalSection
ProcessIdToSessionId
DecodePointer
HeapReAlloc
HeapSize
RaiseException
GetFileSize
ReadFile
MultiByteToWideChar
WideCharToMultiByte
GetSystemInfo
GetTickCount
WriteFile
GetFileAttributesW
CopyFileW
FileTimeToSystemTime
GetVolumeInformationW
OutputDebugStringA
SetPriorityClass
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetStringTypeW
WriteConsoleW
GetFileType
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
SetStdHandle
GetConsoleCP
FlushFileBuffers
SetEndOfFile
VerifyVersionInfoA
GetSystemDirectoryA
GetModuleHandleA
VerSetConditionMask
ExpandEnvironmentStringsA
PeekNamedPipe
WaitForMultipleObjects
SleepEx
FormatMessageA
SwitchToThread
TerminateThread
CreateThread
FindNextFileW
FindFirstFileW
lstrcpyW
FindClose
GetLongPathNameW
CreateToolhelp32Snapshot
DeleteFileW
CreateFileW
GetSystemDirectoryW
LoadLibraryW
CloseHandle
DeviceIoControl
Sleep
OpenProcess
GetProcAddress
FreeLibrary
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
PostMessageW
FindWindowW
LoadStringW
wsprintfW
CryptGenRandom
CryptReleaseContext
LookupPrivilegeValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetTokenInformation
RegSetValueExW
LookupAccountSidW
GetTokenInformation
DuplicateTokenEx
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
RegCreateKeyExW
ImpersonateLoggedOnUser
RevertToSelf
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegCloseKey
CreateProcessAsUserW
OpenProcessToken
CryptAcquireContextW
SHChangeNotify
SHGetFolderPathW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetSpecialFolderPathW
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoInitialize
SHSetValueW
PathFileExistsW
SHDeleteKeyW
SHDeleteValueW
SHGetValueW
WTSQueryUserToken
EnumProcesses
GetProcessImageFileNameW
InternetCloseHandle
InternetQueryOptionW
HttpQueryInfoW
InternetOpenW
InternetSetOptionW
InternetOpenUrlW
InternetReadFile
ord143
ord46
ord211
ord60
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
WSAStartup
gethostname
ioctlsocket
listen
accept
sendto
recvfrom
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
recv
htons
getsockopt
WSACleanup
send
WSAGetLastError
__WSAFDIsSet
select
getsockname
getpeername
connect
closesocket
bind
WSASetLastError
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ