Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
77c9a4107a9ebf6133d50b049c43df4606535c70671a60612b46287416aaceb9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
77c9a4107a9ebf6133d50b049c43df4606535c70671a60612b46287416aaceb9.exe
Resource
win10v2004-20240802-en
Target
77c9a4107a9ebf6133d50b049c43df4606535c70671a60612b46287416aaceb9
Size
331KB
MD5
486d3e3663801af3dd8ae32a210c1189
SHA1
22b8d0453f5565a1c8a7d8ec3d7f283db07363d5
SHA256
77c9a4107a9ebf6133d50b049c43df4606535c70671a60612b46287416aaceb9
SHA512
7b8394ac0790e6ef24eb8b79da82854e83fb7efdcdeab0b72380fd269a2b1c3f936aa2b2294ffcece9c2b1dee476f5b97fb3e488574bb5c9fa3637baf297c930
SSDEEP
6144:cD2nT5hLggksLfkhzhOQX34ic3cDS3Dda8QPyOVKA:rT70gXfihOQX34dsDS3SPrVZ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\My\XMiner\EpicScale\Release\EpicScale.pdb
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetCurrentThreadId
SetThreadPriority
SuspendThread
ResumeThread
GetFileAttributesExW
GetFileSizeEx
GetFileTime
EncodePointer
GetSystemDirectoryW
GlobalDeleteAtom
lstrcmpW
GlobalAddAtomW
GlobalFindAtomW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
SetErrorMode
GlobalFlags
CompareStringW
WaitForSingleObject
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleExW
AreFileApisANSI
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwind
CreateThread
ExitThread
SetStdHandle
GetFileType
HeapQueryInformation
GetStdHandle
GetStartupInfoW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
TerminateProcess
GetConsoleCP
GetConsoleMode
IsValidCodePage
GetOEMCP
GetCPInfo
GetTimeZoneInformation
ReadConsoleW
SetFilePointerEx
WriteConsoleW
LCMapStringW
GetStringTypeW
SetEnvironmentVariableA
MoveFileW
DuplicateHandle
WriteFile
UnlockFile
SetFilePointer
SetEndOfFile
ReadFile
LockFile
GetVolumeInformationW
GetFullPathNameW
GetFileSize
FlushFileBuffers
FindFirstFileW
FindClose
CreateFileW
LeaveCriticalSection
EnterCriticalSection
FormatMessageW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
GetACP
WideCharToMultiByte
GetTempPathW
SetUnhandledExceptionFilter
DecodePointer
HeapSize
RaiseException
InitializeCriticalSectionEx
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
CopyFileW
CreateDirectoryW
TerminateThread
WaitForMultipleObjects
CreateEventA
FreeLibrary
GetCommandLineW
SetLastError
GetConsoleWindow
GetLocalTime
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
GetDiskFreeSpaceW
GetModuleHandleW
DeleteFileW
GetFileAttributesW
CreateEventW
ReleaseMutex
CreateMutexA
SetEvent
MultiByteToWideChar
Sleep
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcmpA
lstrcpyW
LocalFree
LocalAlloc
lstrcpynW
FindResourceW
LoadResource
LockResource
SizeofResource
LoadLibraryExW
LoadLibraryExA
LoadLibraryW
LoadLibraryA
VirtualProtect
WriteProcessMemory
lstrcmpiA
VirtualQuery
GetProcAddress
OutputDebugStringW
GetCurrentProcessId
GetModuleFileNameW
GetModuleHandleA
Module32NextW
Module32FirstW
GetLastError
GetCurrentProcess
CreateToolhelp32Snapshot
CloseHandle
ClientToScreen
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
LoadBitmapW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetWindowThreadProcessId
LoadCursorW
GetSysColorBrush
ReleaseDC
GetDC
SetWindowTextW
IsWindowEnabled
GetMonitorInfoW
MonitorFromWindow
WinHelpW
LoadIconW
UnhookWindowsHookEx
GetLastActivePopup
GetTopWindow
RealChildWindowFromPoint
GetClassLongW
SetWindowLongW
PtInRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowRect
GetClientRect
RemovePropW
GetPropW
SetPropW
RedrawWindow
SetForegroundWindow
GetForegroundWindow
SetMenu
GetMenu
DestroyMenu
GetCapture
GetFocus
GetDlgCtrlID
SetWindowPos
DestroyWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
PostQuitMessage
GetClassNameW
CallWindowProcW
DefWindowProcW
GetMessageTime
GetMessagePos
GetWindow
GetWindowLongW
GetWindowTextW
CallNextHookEx
SetWindowsHookExW
GetCursorPos
ValidateRect
GetKeyState
GetActiveWindow
IsWindowVisible
GetMessageW
GetSystemMetrics
CharUpperW
GetDesktopWindow
GetMenuItemCount
GetMenuItemID
GetSubMenu
GetParent
DialogBoxParamW
UnregisterClassW
UpdateWindow
DispatchMessageW
TranslateMessage
PeekMessageW
GetDlgItem
CreateDialogParamW
ShowWindow
SendMessageW
MessageBoxW
EndDialog
SetDlgItemTextW
PostMessageW
IsWindow
FindWindowW
RegisterWindowMessageW
EnableWindow
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
ExtTextOutW
TextOutW
SetBkColor
GetDeviceCaps
SetMapMode
SelectObject
SaveDC
RestoreDC
RectVisible
PtVisible
GetStockObject
GetClipBox
Escape
DeleteObject
DeleteDC
CreateBitmap
SetTextColor
DocumentPropertiesW
ClosePrinter
OpenPrinterW
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegGetValueW
RegOpenKeyW
RegCreateKeyExW
SHGetFolderPathW
ShellExecuteW
CommandLineToArgvW
UrlUnescapeW
PathIsUNCW
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
CoCreateInstance
CoUninitialize
CoInitialize
VariantInit
VariantClear
VariantChangeType
ImageDirectoryEntryToData
CryptDecodeObject
CertGetNameStringW
CryptMsgClose
CertCloseStore
CertFreeCertificateContext
CertFindCertificateInStore
CryptQueryObject
CryptMsgGetParam
HttpQueryInfoW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetErrorDlg
InternetSetStatusCallbackW
InternetCrackUrlW
InternetCanonicalizeUrlW
InternetOpenW
InternetCloseHandle
InternetConnectW
InternetReadFile
InternetSetFilePointer
InternetWriteFile
InternetQueryDataAvailable
InternetGetLastResponseInfoW
LresultFromObject
CreateStdAccessibleObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ