Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
caf385cc75332c1a300a117f8df1368ecd673561fdb817612be806e6d1b232f3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
caf385cc75332c1a300a117f8df1368ecd673561fdb817612be806e6d1b232f3.exe
Resource
win10v2004-20240802-en
Target
caf385cc75332c1a300a117f8df1368ecd673561fdb817612be806e6d1b232f3.exe
Size
2.5MB
MD5
dfe64c3d08cc525d4806b55d93f76ec4
SHA1
86da567b1d575f21431ec4b706698778ad789928
SHA256
caf385cc75332c1a300a117f8df1368ecd673561fdb817612be806e6d1b232f3
SHA512
dcef6f5e375c632a46910070db5afb82e1c5947f3cd27dbcf34c08518f2499bc19f6f064c5e7fe31498a883df7d428a50ea6d6e41cce3115586f9481ebfc16e7
SSDEEP
49152:6f9gJI+Q2RZjHAGUTF2tVKXQkzfSplLE83kH3/I4zbQ:6ftIlH/Kap+LHPIZ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\jenkins_win\workspace\cpp-webuff\cpp\src\webuff\bin\Release\WeBuffCore.pdb
NtResumeProcess
NtSuspendProcess
RtlUnwind
GetCurrentProcess
GetFileSize
ReadFile
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
lstrcmpiW
Module32FirstW
Module32NextW
TerminateProcess
GetModuleFileNameW
GetModuleFileNameA
CreateEventW
CreateProcessW
K32GetProcessMemoryInfo
FindFirstFileW
FindNextFileW
FindClose
CreateFileA
WaitNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
FlushFileBuffers
DisconnectNamedPipe
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesW
CreateDirectoryW
GetLogicalDriveStringsW
QueryDosDeviceW
lstrlenW
lstrcpyW
lstrcatW
K32GetProcessImageFileNameW
GetFullPathNameW
GetExitCodeProcess
CreateEventA
LoadLibraryW
DeleteFileA
SetFileAttributesA
SetFileAttributesW
lstrcpyA
lstrcatA
FindFirstFileA
lstrcmpiA
FindNextFileA
RemoveDirectoryA
GetFileAttributesA
InitializeCriticalSection
DeleteCriticalSection
LocalFree
LocalAlloc
CreateNamedPipeW
GetTickCount
ResetEvent
EnterCriticalSection
LeaveCriticalSection
FindResourceW
LoadResource
LockResource
SizeofResource
CopyFileW
FreeResource
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFinalPathNameByHandleA
GetPrivateProfileIntA
CreateDirectoryA
SetUnhandledExceptionFilter
GetCurrentThread
GetCurrentThreadId
IsWow64Process
PostQueuedCompletionStatus
CreateIoCompletionPort
GetQueuedCompletionStatus
QueryPerformanceCounter
QueryPerformanceFrequency
GetThreadTimes
FindFirstFileExW
ReadConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetFileType
EnumSystemLocalesW
SetLastError
GetModuleHandleW
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
OpenProcess
Sleep
CloseHandle
WriteFile
CreateFileW
DeleteFileW
SetEvent
GetLastError
GetLocalTime
VirtualFree
VirtualAlloc
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
GetStdHandle
ExitProcess
GetStartupInfoW
IsDebuggerPresent
UnhandledExceptionFilter
GetModuleHandleExW
SetEndOfFile
WriteConsoleW
SetStdHandle
InitializeSListHead
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
ExitThread
GetTimeZoneInformation
GetFileAttributesExW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
GetVersionExW
LoadLibraryExW
FreeLibraryAndExitThread
FreeLibrary
OutputDebugStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
WaitForMultipleObjects
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
TryEnterCriticalSection
EncodePointer
DecodePointer
RaiseException
DuplicateHandle
WaitForSingleObjectEx
GetExitCodeThread
GetNativeSystemInfo
IsProcessorFeaturePresent
QueueUserWorkItem
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
FindResourceExW
CharNextW
GetIconInfo
GetParent
GetWindowLongW
GetWindowThreadProcessId
EnumWindows
MessageBoxW
GetObjectW
DeleteObject
InitializeSecurityDescriptor
OpenThreadToken
RegEnumKeyExA
RegOpenKeyExW
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetSecurityDescriptorDacl
LookupPrivilegeValueW
RegEnumKeyExW
RegQueryInfoKeyW
AdjustTokenPrivileges
OpenProcessToken
SHGetSpecialFolderPathA
ShellExecuteA
ExtractIconExW
CoInitialize
CoInitializeEx
CoCreateInstance
CoUninitialize
OleRun
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
PathAddBackslashA
PathRemoveFileSpecA
PathAddBackslashW
PathRemoveFileSpecW
StrCpyW
StrToIntW
PathFindFileNameW
GdipBitmapUnlockBits
GdipCreateBitmapFromScan0
GdipGetImagePixelFormat
GdipBitmapLockBits
GdipGetImageWidth
GdiplusStartup
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipCreateBitmapFromHICON
GdipGetImageHeight
GdipAlloc
GdipCloneImage
GdiplusShutdown
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipFree
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpConnect
WinHttpSetOption
WinHttpSetTimeouts
WinHttpOpen
WinHttpCloseHandle
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ