Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
d0fb0786fa95953d44fa3581def79ce05552633736f763133a2ef539a8037bb6.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d0fb0786fa95953d44fa3581def79ce05552633736f763133a2ef539a8037bb6.exe
Resource
win10v2004-20240802-en
Target
d0fb0786fa95953d44fa3581def79ce05552633736f763133a2ef539a8037bb6
Size
860KB
MD5
bd58792545702b34c792780c42c8ad50
SHA1
5d949a8f10b3c91f38f5755d480d204f4be8a333
SHA256
d0fb0786fa95953d44fa3581def79ce05552633736f763133a2ef539a8037bb6
SHA512
a072be514082600858a67817c318cc39b4895073fb82802f1660d5be8cd6d7d93159564556e1fc9e610d18f365f7cca8d2289a8522b0dbc548a86893ed679110
SSDEEP
12288:JpZuDnCTucMAGVzfvNam4ifyIgCf7N/7P4U1QAH/urqjnZzzAFWg:JuCTJMDZvn4i6SQU7fumVfAf
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
D:\qci_workspace\root-workspaces\__qci-pipeline-559731-1\app\Windows\output\bin\Release\wwmapp.pdb
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
WTHelperGetProvSignerFromChain
WTHelperGetProvCertFromChain
WinVerifyTrust
WTHelperProvDataFromStateData
CertGetNameStringW
MultiByteToWideChar
WideCharToMultiByte
TerminateProcess
GetFileSize
OutputDebugStringA
CloseHandle
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
GetCurrentProcess
IsDebuggerPresent
FreeLibrary
SetDllDirectoryW
LoadLibraryW
LoadLibraryA
VirtualProtect
LoadLibraryExW
LoadLibraryExA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCurrentThreadId
SetEvent
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetLastError
GetLastError
RaiseException
DecodePointer
OutputDebugStringW
SetCurrentDirectoryW
GetCommandLineW
LocalFree
GetCurrentThread
CreateFileW
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
QueryPerformanceCounter
QueryPerformanceFrequency
EncodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
HeapSetInformation
VirtualAllocEx
VirtualQueryEx
GetModuleHandleA
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
InitializeCriticalSection
WaitForSingleObject
CreateThread
TerminateJobObject
SetInformationJobObject
GetUserDefaultLangID
GetUserDefaultLCID
DuplicateHandle
UnregisterWaitEx
RegisterWaitForSingleObject
GetExitCodeProcess
GetThreadContext
WriteProcessMemory
AssignProcessToJobObject
GetFileType
SetHandleInformation
ProcessIdToSessionId
GetProcessHandleCount
VirtualFree
SignalObjectAndWait
CreateMutexW
GetFileAttributesW
GetLongPathNameW
QueryDosDeviceW
VirtualProtectEx
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
CreateRemoteThread
CreateProcessW
ReadProcessMemory
GetModuleHandleExW
DebugBreak
lstrlenW
GetCurrentDirectoryW
SearchPathW
GetVersionExW
GetNativeSystemInfo
WriteConsoleW
WriteFile
FormatMessageA
VirtualQuery
RtlCaptureStackBackTrace
ReadFile
SetEndOfFile
FlushFileBuffers
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
RtlUnwind
ExitProcess
GetStdHandle
GetACP
GetConsoleCP
GetConsoleMode
SetStdHandle
IsValidLocale
EnumSystemLocalesW
ReadConsoleW
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessWindowStation
GetUserObjectInformationW
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
CloseWindowStation
CloseDesktop
CallNextHookEx
SetWindowsHookExW
GetDesktopWindow
MessageBoxW
PostThreadMessageW
wsprintfW
CoAddRefServerProcess
CoReleaseServerProcess
CoCreateInstance
CoInitialize
CoUninitialize
SysAllocString
SysFreeString
SysStringByteLen
SysAllocStringByteLen
SetThreadToken
CreateProcessAsUserW
LookupPrivilegeValueW
GetTokenInformation
ConvertSidToStringSidW
OpenProcessToken
GetAce
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegCloseKey
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SystemFunction036
GetSecurityInfo
RegCreateKeyExW
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
SetEntriesInAclW
PathFileExistsW
PathFindFileNameW
PathRemoveFileSpecW
wvnsprintfW
SymFromAddr
SymSetOptions
SymGetLineFromAddr64
SymInitialize
SymGetSearchPathW
SymSetSearchPathW
timeGetTime
CLInfo
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE