Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
Touchup.exe
Resource
win10v2004-20240802-en
Target
Touchup.exe
Size
906KB
MD5
0fed73c210e71f14aa2cea7573c6b575
SHA1
4a0c75cd6bb334ab29180513b749928bbd93fe22
SHA256
b63262a0544d8b36045f71681e85122099330507b3f6ea930d718bb04ce5845a
SHA512
3ba27a3aa7f13e544fcd7083244be2a6bd8fda2a83879adb78a830c63e2df17d8119ec999a5a2257c86b11645b7e21a6ab1181de7f144145740a7d9a733f0684
SSDEEP
12288:sLPlvNSqyyO8ZW+LusydzFl8CtWftiK+3+Zw/Gbo4F/aRlz+ka8:iqsydXHWViK+ui+bD8
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
LoadLibraryA
FormatMessageA
Sleep
WriteFile
FlushFileBuffers
SetFilePointer
CloseHandle
GetDriveTypeW
CreateDirectoryW
CreateFileW
GetProcAddress
GetLongPathNameW
OpenProcess
GetLastError
LoadResource
GetFileSize
ReadFile
FindClose
GetSystemInfo
lstrlenW
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
FindResourceExW
GetCurrentDirectoryW
RemoveDirectoryW
QueryDosDeviceW
SetFileAttributesW
GetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
GetVersionExW
WideCharToMultiByte
GetUserDefaultLangID
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Module32FirstW
Module32NextW
GetCurrentThreadId
WaitForSingleObject
CreateProcessW
CopyFileW
GetExitCodeProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
ReleaseMutex
RtlPcToFileHeader
EncodePointer
RaiseException
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
CreateProcessA
GetFileAttributesExW
GetFileType
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStringTypeW
CreateThread
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
GetProcessHeap
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
CreateMutexW
QueryPerformanceFrequency
GetTempPathW
DuplicateHandle
ReadConsoleW
MoveFileExW
CreatePipe
SetEndOfFile
LocalFree
MultiByteToWideChar
CoInitializeEx
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoSetProxyBlanket
VariantClear
SysFreeString
VariantInit
SysAllocString
PathRemoveFileSpecW
ord113
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ShowWindow
DestroyWindow
CreateDialogParamW
GetDlgItem
SetDlgItemTextW
GetSystemMetrics
SendMessageW
PostMessageW
DispatchMessageW
GetDC
LoadIconW
SetWindowTextW
MessageBoxW
SetWindowsHookExW
UnhookWindowsHookEx
TranslateMessage
GetMessageW
GetWindowPlacement
IsWindow
CallNextHookEx
SetWindowPlacement
IsDialogMessageW
GetTextExtentPoint32W
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
SHGetFolderPathW
ord165
SHCreateDirectoryExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ