Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2136f2026272ae4785d81fd2a525b9bdba67ae8d799ac08491659876f4cfe696.exe
Resource
win7-20240705-en
Target
2136f2026272ae4785d81fd2a525b9bdba67ae8d799ac08491659876f4cfe696
Size
4.0MB
MD5
9cb1c0dcbf95eda0b60c9fde55c4c02b
SHA1
a2aaadd74aeee30fb1edf9e72e7741668a7861e6
SHA256
2136f2026272ae4785d81fd2a525b9bdba67ae8d799ac08491659876f4cfe696
SHA512
7132c80fd37970de7eac44bef9611a4d7938e0325453a510c7a6cab4176c6c9371424d9e14a78d7c96c3a4b70dd8bdf65552113ad13c2e6c361e180ea6240a08
SSDEEP
6144:QSj19QP9G+wgVFGOBD+Tl/Qa8Vx+z0JxR7xMJz/qffNNuZxX5DR38x5+jT0w:QSj1KA+wg9BD+TVGczIhxMKq73PjT0w
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
LoadLibraryExW
VirtualAlloc
GetModuleHandleW
Sleep
WinExec
TerminateProcess
OutputDebugStringW
OpenProcess
LoadLibraryW
LeaveCriticalSection
InitializeCriticalSection
GetWindowsDirectoryW
GetVersionExW
GetTickCount
GetTempPathW
GetSystemInfo
GetSystemDirectoryW
GetLastError
GetCurrentProcessId
GetCurrentProcess
FreeLibrary
EnterCriticalSection
DeleteCriticalSection
CreateMutexW
CloseHandle
ProcessIdToSessionId
CancelDeviceWakeupRequest
FreeResource
SetHandleInformation
CreateEventA
FindFirstChangeNotificationA
lstrcpyW
_llseek
GetPrivateProfileSectionW
SetFileApisToANSI
ReadConsoleOutputAttribute
lstrlenW
InterlockedExchange
GetCPInfoExA
IsBadStringPtrW
SetErrorMode
SetUnhandledExceptionFilter
GetEnvironmentVariableA
GetDriveTypeW
SetInformationJobObject
AssignProcessToJobObject
_lread
ReplaceFileA
MoveFileWithProgressA
GetEnvironmentStringsA
GetTapeStatus
CallNamedPipeW
SetThreadLocale
GetComputerNameA
ExpandEnvironmentStringsW
lstrcmpiW
GetCommandLineW
IsWow64Process
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
GetModuleHandleA
LocalFree
LocalAlloc
LoadCursorA
SetForegroundWindow
PostMessageW
GetForegroundWindow
FindWindowW
CloseWindow
EnableScrollBar
SetLayeredWindowAttributes
UpdateLayeredWindow
wsprintfA
LoadAcceleratorsW
ClipCursor
RealGetWindowClassW
CreateAcceleratorTableW
CreateMDIWindowW
GetWindowWord
SetDoubleClickTime
InflateRect
WINNLSGetEnableStatus
CharNextA
GetShellWindow
GetMenuContextHelpId
EnableWindow
RemoveMenu
DrawTextA
BringWindowToTop
DrawTextW
PostThreadMessageW
keybd_event
UnregisterClassA
GetPriorityClipboardFormat
SetMessageQueue
RedrawWindow
FindWindowA
ChildWindowFromPoint
LookupIconIdFromDirectory
GetKeyboardLayout
MessageBoxW
LoadStringW
GetEnhMetaFileA
CreateHalftonePalette
CreateSolidBrush
DeleteEnhMetaFile
CreatePatternBrush
CloseMetaFile
DeleteColorSpace
CreateCompatibleDC
DeleteMetaFile
DeleteDC
STROBJ_bEnum
SetFontEnumeration
EnumFontFamiliesExW
GetColorSpace
EngFindResource
GdiFlush
CreateDCW
GetEUDCTimeStamp
CreateMetaFileW
EngFreeModule
GetKerningPairsA
STROBJ_vEnumStart
CloseFigure
GetFontAssocStatus
EndPath
CreateRectRgn
GdiConvertAndCheckDC
GetHFONT
AnyLinkedFonts
GdiEntry8
EngAcquireSemaphore
EngCreatePalette
RegOpenKeyW
RegQueryValueExW
RevertToSelf
OpenProcessToken
LookupAccountSidW
ImpersonateLoggedOnUser
GetUserNameW
GetTokenInformation
ChangeServiceConfig2W
RegCreateKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetKeySecurity
RegSetValueExW
RegCloseKey
OpenSCManagerW
OpenServiceW
CreateServiceW
CloseServiceHandle
ChangeServiceConfigW
AllocateAndInitializeSid
SetFileSecurityW
FreeSid
GetSidSubAuthorityCount
GetSidLengthRequired
CopySid
GetSidSubAuthority
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
AddAccessAllowedAceEx
AddAccessDeniedAceEx
AddAuditAccessAceEx
InitializeAcl
GetLengthSid
AdjustTokenPrivileges
LookupPrivilegeValueW
SetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ShellExecuteW
SHGetSpecialFolderPathW
ord680
DragFinish
SHLoadInProc
SHGetSpecialFolderLocation
SHChangeNotify
DragQueryFileA
SHFileOperationA
DoEnvironmentSubstW
SHGetPathFromIDListW
SHGetDesktopFolder
SHInvokePrinterCommandW
SHLoadNonloadedIconOverlayIdentifiers
SHGetFileInfoW
SHGetFolderPathW
SHIsFileAvailableOffline
ShellExecuteExA
SHFileOperationW
WOWShellExecute
ExtractIconEx
FindExecutableA
SHEmptyRecycleBinA
CheckEscapesW
SHGetDataFromIDListW
FindExecutableW
Shell_NotifyIcon
StrRStrIW
StrChrW
StrRChrA
StrCmpNIW
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
wcstok
_vsnwprintf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ