Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Target
spoof.exe
Size
1.6MB
MD5
f7fc7000fecaab389d7bc2c5cf42df64
SHA1
71454e38b067a59866be4efcc1af698371cfb0f4
SHA256
f39c0f268730f4529a5d1d28af7ccbd1ef3d9e132c67bcdf808ac78acc2dddcf
SHA512
de36e6c15bf10e5ed69d39fc4f5e4c4128bcad7fe8fab403622cbb969a80da59213f133d797c87425ae7651d4f3a749a16bac36e44aeb4d62ecfb7fae3e52d4b
SSDEEP
24576:PiOm0tuHBEwdjEaZJVamphU9hDe/1Cdc0LQgTjCQyQwodrtDTHf66bmIHYV6O:PiNVxdjEabpGD8bE5yQwodrtDT/lK6O
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\tmp\geruest\tabbedsdisplitter-3.0j\x64\Release\chamy64.pdb
GetAdaptersAddresses
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
LsaFreeReturnBuffer
LsaGetLogonSessionData
LsaEnumerateLogonSessions
CertEnumCertificatesInStore
CertCloseStore
CertOpenSystemStoreW
WinStationEnumerateW
WinStationFreeMemory
WinStationQueryInformationW
GetProcessHeap
WriteFile
GetUserDefaultLangID
OpenProcess
GlobalAlloc
GetSystemDirectoryW
WideCharToMultiByte
LoadLibraryW
GetConsoleMode
Sleep
GetConsoleWindow
GetVersionExW
WriteConsoleW
TerminateProcess
ReadFile
GetModuleFileNameW
GetTimeZoneInformation
CreateFileW
lstrcmpW
lstrlenW
SetThreadPriority
GlobalUnlock
GetTempPathW
GetLastError
SetLastError
GetProcAddress
GlobalFree
FindClose
Process32FirstW
AddVectoredExceptionHandler
SetConsoleCtrlHandler
GlobalHandle
Process32NextW
GetProcessShutdownParameters
GetFinalPathNameByHandleW
lstrcatW
FindNextFileW
CreateToolhelp32Snapshot
GetCurrentThreadId
SetProcessShutdownParameters
CloseHandle
DeleteFileW
GetCurrentProcessId
LocalFree
WriteProcessMemory
lstrcpyW
SetFileAttributesW
LCMapStringW
RtlZeroMemory
CreateThread
GetFullPathNameW
GetFullPathNameA
HeapReAlloc
CreateFileA
CreateMutexW
HeapCompact
SetFilePointer
TryEnterCriticalSection
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
FreeLibrary
SystemTimeToFileTime
QueryPerformanceCounter
UnlockFile
FlushViewOfFile
LockFile
WaitForSingleObjectEx
OutputDebugStringW
UnlockFileEx
GetSystemTimeAsFileTime
FormatMessageA
InitializeCriticalSection
FormatMessageW
HeapDestroy
LeaveCriticalSection
GetFileAttributesA
HeapCreate
HeapValidate
GetFileAttributesW
MultiByteToWideChar
FlushFileBuffers
HeapSize
LockFileEx
EnterCriticalSection
GetDiskFreeSpaceW
LoadLibraryA
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
GetSystemInfo
GetFileAttributesExW
DeleteCriticalSection
OutputDebugStringA
GetVersionExA
GetTempPathA
GetSystemTime
AreFileApisANSI
DeleteFileA
ReadConsoleW
SetFilePointerEx
CompareStringW
GetCurrentThread
CreateNamedPipeW
GetTickCount
GetModuleHandleW
ConnectNamedPipe
SleepEx
SetThreadExecutionState
SetEvent
WaitForSingleObject
GlobalLock
HeapFree
GetCurrentProcess
SetUnhandledExceptionFilter
HeapAlloc
CreateProcessW
SetErrorMode
GetDriveTypeW
FindFirstFileW
SetPriorityClass
GetFileSize
GetTempFileNameW
ExitProcess
SetStdHandle
SetEnvironmentVariableW
GetConsoleCP
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
GetCommandLineW
GetFileType
GetStdHandle
GetModuleHandleExW
IsProcessorFeaturePresent
IsDebuggerPresent
LoadLibraryExW
SetEnvironmentVariableA
ExitThread
DecodePointer
EncodePointer
ExitWindowsEx
GetShellWindow
GetWindowThreadProcessId
wsprintfW
ShowWindow
GetSystemMetrics
StartPage
MoveToEx
EndPage
GetTextMetricsW
LineTo
TextOutW
SelectObject
SetMapMode
GetTextExtentPointW
InitializeSecurityDescriptor
CloseServiceHandle
GetSecurityDescriptorDacl
RegSetValueExW
EnumServicesStatusExW
RegCloseKey
RegLoadKeyW
InitiateSystemShutdownW
EncryptFileW
ConvertSidToStringSidW
RegFlushKey
AbortSystemShutdownW
ControlService
RegisterServiceCtrlHandlerW
FreeSid
OpenProcessToken
CryptAcquireContextW
DeleteService
OpenThreadToken
OpenSCManagerW
StartServiceCtrlDispatcherW
EnumDependentServicesW
GetUserNameW
RevertToSelf
SetEntriesInAclW
QueryServiceStatusEx
SetServiceStatus
AllocateAndInitializeSid
RegDeleteValueW
CredWriteW
DuplicateTokenEx
StartServiceW
LookupAccountSidW
ImpersonateSelf
SetSecurityDescriptorDacl
ConvertStringSidToSidW
SetTokenInformation
OpenServiceW
CreateProcessAsUserW
RegQueryValueExW
CryptReleaseContext
EqualSid
GetTokenInformation
CredReadW
CreateServiceW
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
SysAllocString
SysFreeString
NtRenameKey
NtShutdownSystem
memchr
NtLoadKey
NtSetThreadExecutionState
NtSetInformationFile
RtlGetVersion
NtCreateKey
RtlUnicodeToMultiByteN
RtlGetSaclSecurityDescriptor
NtQueryInformationFile
vswprintf_s
MD5Update
NtQueryInformationProcess
RtlTimeFieldsToTime
_wcslwr
RtlSetGroupSecurityDescriptor
NtQueryDirectoryFile
RtlGetGroupSecurityDescriptor
NtWaitForSingleObject
RtlSetSaclSecurityDescriptor
strncpy
NtQueryVolumeInformationFile
wcsstr
_wcsicmp
RtlGetControlSecurityDescriptor
NtCreateFile
RtlNtStatusToDosError
NtClose
swprintf_s
NtOpenKeyEx
RtlQueryInformationAcl
RtlSetLastWin32ErrorAndNtStatusFromNtStatus
MD5Init
RtlEqualSid
RtlTimeToTimeFields
swscanf_s
NtQueryPerformanceCounter
RtlGetDaclSecurityDescriptor
RtlLeaveCriticalSection
NtOpenProcessToken
NtCreateSemaphore
toupper
NtQueryInformationToken
NtSetSecurityObject
NtQueryValueKey
NtSetValueKey
wcsncmp
NtSetInformationKey
towupper
NtDeleteKey
NtQueryObject
RtlAllocateAndInitializeSid
RtlMultiByteToUnicodeN
RtlGetOwnerSecurityDescriptor
NtOpenFile
RtlInitializeCriticalSection
RtlCreateUserThread
NtReadFile
NtDuplicateObject
RtlCreateSecurityDescriptor
RtlSetOwnerSecurityDescriptor
strrchr
strcspn
RtlGetAce
wcschr
NtFlushKey
NtEnumerateValueKey
NtAllocateVirtualMemory
towlower
NtDeleteValueKey
NtFsControlFile
RtlInitUnicodeString
RtlSetDaclSecurityDescriptor
RtlFreeSid
NtReleaseSemaphore
_wcsnicmp
NtUnloadKey
NtQueryInformationThread
NtQuerySystemInformation
RtlSetLastWin32Error
NtWriteFile
NtDeviceIoControlFile
strncmp
RtlEnterCriticalSection
memmove
NtQuerySystemTime
NtQuerySecurityObject
NtEnumerateKey
sscanf
sprintf_s
NtFlushBuffersFile
NtGetTickCount
MD5Final
NtDelayExecution
NtQueryKey
RtlAdjustPrivilege
RtlGetLastWin32Error
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ