Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
240d0eac43e75fc148f80df909157cd0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
240d0eac43e75fc148f80df909157cd0N.exe
Resource
win10v2004-20240802-en
Target
240d0eac43e75fc148f80df909157cd0N.exe
Size
1.2MB
MD5
240d0eac43e75fc148f80df909157cd0
SHA1
8f1052b4b96af0428729d067bf903ee2e5732687
SHA256
b87bc1dcb8f1b43df85810957d813fd1575f7ea594a73ca65478d72900ca0270
SHA512
478d317c7c4050c2e8aa2dc54b610b62c742cace03f70db11e86a1d8739ce82ab85a9a3711a9c7ab5c96b816e98f74c76fd3c1776eb51232d3743a2d58321ded
SSDEEP
24576:KmHPogOvEZL3tPOH+4VNt6h3S/T4Qb73ue8FYU2i:dog0EZziki/8QbsKU5
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
c:\pl\output\ProcessGovernor.pdb
GetDateFormatEx
OpenEventW
GetVersionExW
ReleaseMutex
OpenProcess
CreateEventW
Sleep
GetTickCount64
SetEvent
FileTimeToSystemTime
GetCurrentThread
TerminateThread
DeleteFileW
LoadLibraryW
CreateThread
ResetEvent
FileTimeToLocalFileTime
GetCurrentDirectoryW
SetThreadPriorityBoost
GetProcAddress
GetFileSize
ExitProcess
GetComputerNameW
GetCurrentProcessId
CreateProcessW
SetThreadExecutionState
GetModuleHandleW
FreeLibrary
GetSystemTime
GetTickCount
GetProcessTimes
SetUnhandledExceptionFilter
GlobalMemoryStatusEx
FindFirstChangeNotificationW
FindCloseChangeNotification
FindNextChangeNotification
SetEndOfFile
SetFilePointer
InitializeCriticalSection
SetThreadPriority
SetProcessShutdownParameters
WaitForMultipleObjects
GetProcessAffinityMask
GetTimeFormatEx
WriteFile
SetProcessAffinityMask
GetCurrentProcess
GetCommandLineW
SetPriorityClass
ReadFile
CreateDirectoryW
SetProcessPriorityBoost
LeaveCriticalSection
EnterCriticalSection
GetSystemInfo
CloseHandle
MultiByteToWideChar
GetFileAttributesW
InitializeCriticalSectionAndSpinCount
GetFileTime
GetSystemTimeAsFileTime
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
FindResourceW
LoadResource
FindResourceExW
CreateMutexW
HeapReAlloc
LockResource
GetActiveProcessorGroupCount
GetActiveProcessorCount
CreateToolhelp32Snapshot
Thread32First
Thread32Next
OpenThread
SetThreadGroupAffinity
FormatMessageW
GetProcessGroupAffinity
LocalFree
WideCharToMultiByte
VerifyVersionInfoW
GetLastError
GetPriorityClass
SetProcessWorkingSetSize
TerminateProcess
GetLogicalProcessorInformationEx
GetHandleInformation
GetUserDefaultUILanguage
GetModuleFileNameW
GetStartupInfoW
ProcessIdToSessionId
SetLastError
GetVolumeNameForVolumeMountPointW
MoveFileW
GetSystemDirectoryW
GlobalAlloc
GlobalLock
GlobalUnlock
GetProcessPriorityBoost
ResumeThread
GetLocalTime
OpenMutexW
K32GetModuleBaseNameW
GetDateFormatW
GetTimeFormatW
GetCurrentThreadId
SuspendThread
GetExitCodeThread
MoveFileExW
FlushFileBuffers
FindNextFileW
LocalAlloc
MulDiv
LocalLock
LocalUnlock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
WaitForSingleObjectEx
LoadLibraryExW
GetStringTypeW
EncodePointer
QueryPerformanceCounter
WakeAllConditionVariable
SleepConditionVariableSRW
CompareStringEx
GetCPInfo
LCMapStringEx
IsDebuggerPresent
OutputDebugStringW
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
GetCommandLineA
GetFileType
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileSizeEx
SetFilePointerEx
GetTimeZoneInformation
FindClose
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetConsoleOutputCP
GetConsoleMode
WriteConsoleW
HeapSize
CreateFileW
WaitForSingleObject
InitializeCriticalSectionEx
HeapFree
SizeofResource
VerSetConditionMask
GetLocaleInfoEx
SetRect
GetActiveWindow
GetLastActivePopup
MessageBeep
BeginPaint
DrawIcon
EndPaint
GetSysColor
GetDialogBaseUnits
SystemParametersInfoW
DrawTextW
LoadIconW
DestroyIcon
FillRect
IsWindow
GetClassNameW
EnableMenuItem
GetSystemMenu
SetFocus
SetWindowPos
SetForegroundWindow
GetWindowRect
MoveWindow
SetTimer
KillTimer
WinHelpW
RedrawWindow
GetAsyncKeyState
PeekMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
WaitMessage
PostQuitMessage
DestroyWindow
GetWindow
SetWindowTextW
GetWindowTextW
SendMessageW
GetSystemMetrics
GetClientRect
LoadStringW
wvsprintfW
GetWindowLongPtrW
SetWindowLongPtrW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
EnableWindow
CheckDlgButton
CreateDialogIndirectParamW
MessageBoxW
GetDlgItem
PostMessageW
EnumWindows
GetParent
IsWindowVisible
GetForegroundWindow
GetWindowThreadProcessId
GetLastInputInfo
DuplicateTokenEx
EnumServicesStatusExW
StartServiceW
QueryServiceStatus
QueryServiceConfigW
CloseServiceHandle
OpenServiceW
GetUserNameW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegQueryValueExW
RegSetValueExW
GetTokenInformation
ControlService
ConvertStringSidToSidW
SetTokenInformation
GetLengthSid
CreateProcessAsUserW
LookupAccountSidW
GetSidSubAuthorityCount
GetSidSubAuthority
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
OpenSCManagerW
ShellExecuteExW
SHGetSpecialFolderPathW
ShellExecuteW
SHCreateDirectoryExW
SysFreeString
VariantClear
WTSFreeMemory
WTSQuerySessionInformationW
SHDeleteKeyW
PdhCloseQuery
PdhCollectQueryData
PdhAddEnglishCounterW
PdhGetFormattedCounterValue
PdhRemoveCounter
PdhOpenQueryW
MiniDumpWriteDump
UuidCreate
UuidFromStringW
SetTextColor
SetBkColor
SelectObject
DeleteDC
CreateFontIndirectW
CreateDCW
CreateSolidBrush
DeleteObject
GetTextExtentPoint32W
StringFromGUID2
IIDFromString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ