Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
e3eb3be8a6b1d60f96bc6d289e703340d04760478ae4350cf10e660616d4fcd3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3eb3be8a6b1d60f96bc6d289e703340d04760478ae4350cf10e660616d4fcd3.exe
Resource
win10v2004-20241007-en
Target
e3eb3be8a6b1d60f96bc6d289e703340d04760478ae4350cf10e660616d4fcd3
Size
1.2MB
MD5
74d4a7129ca9569e4468d60aac419dfc
SHA1
d73b51040f18b5c6ab93d94faf5030b3dd317415
SHA256
e3eb3be8a6b1d60f96bc6d289e703340d04760478ae4350cf10e660616d4fcd3
SHA512
487bb242effe8e7273baaf7c5f79d127a0335bf20ff1d4a0abde90f0d406f0f4fd949fb348803345e9b574a92592158b97cab23b51fee9357826a6ba6f2cb391
SSDEEP
12288:dOUnLx+GgIZDj562/Y/sZcbR//l1WcSYvCNGtuzw3E458hbb5:dBYTYJnKt1WcSfsusz4b5
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
SetFileAttributesW
ReadFileEx
RtlUnwindEx
GetACP
LocalFree
CloseHandle
GetCurrentProcessId
SizeofResource
VirtualProtect
TerminateThread
QueryPerformanceFrequency
FindNextFileW
FlushInstructionCache
GetFullPathNameW
GetThreadContext
VirtualFree
SetThreadContext
ExitProcess
HeapAlloc
GetLongPathNameW
WriteProcessMemory
SetUnhandledExceptionFilter
RtlUnwind
GetCPInfo
GetStdHandle
GetTimeZoneInformation
GetModuleHandleW
FreeLibrary
SetDllDirectoryW
ReadFile
CreateProcessW
CreateRemoteThread
GetModuleFileNameW
GetLastError
SetLastError
GetNativeSystemInfo
FindResourceW
OpenMutexW
CompareStringW
CreateThread
MapViewOfFile
CreateMutexW
LoadLibraryA
ResetEvent
GetVolumeInformationW
FreeResource
GetDriveTypeW
GetVersion
RaiseException
GetSystemTimeAsFileTime
FormatMessageW
OpenProcess
SwitchToThread
GetExitCodeThread
OutputDebugStringW
GetCurrentThread
HeapReAlloc
IsBadReadPtr
GlobalMemoryStatusEx
SetNamedPipeHandleState
IsProcessorFeaturePresent
LoadLibraryExW
LockResource
FileTimeToSystemTime
GetCurrentThreadId
UnhandledExceptionFilter
MoveFileExW
VirtualQuery
VirtualQueryEx
Sleep
HeapWalk
EnterCriticalSection
GetDiskFreeSpaceExW
SetFilePointer
ReleaseMutex
LoadResource
SuspendThread
GetTickCount
EnumResourceLanguagesW
GetFileSize
GetStartupInfoW
GetFileAttributesW
GetCurrentDirectoryW
InitializeCriticalSection
GetCurrentProcess
VirtualAlloc
HeapSetInformation
GetTempPathW
GetSystemInfo
GetCommandLineW
LeaveCriticalSection
GetProcAddress
ResumeThread
VirtualAllocEx
FindResourceExW
GetLogicalDriveStringsW
GetVersionExW
GetModuleHandleA
VerifyVersionInfoW
HeapCreate
GetEnvironmentStringsW
DeviceIoControl
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
UnmapViewOfFile
GetModuleFileNameA
WriteFileEx
lstrlenW
GetVolumeNameForVolumeMountPointW
CompareStringA
SetEndOfFile
QueryPerformanceCounter
WaitForSingleObjectEx
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
FreeEnvironmentStringsW
SetEvent
CreateFileW
GetLocaleInfoW
SystemTimeToFileTime
RtlCaptureStackBackTrace
DeleteFileW
GetEnvironmentVariableW
GetLocalTime
WaitForSingleObject
GetSystemPowerStatus
WriteFile
FindFirstFileExW
CreateFileMappingW
ExitThread
OpenThread
DeleteCriticalSection
HeapLock
GetDateFormatW
TlsGetValue
HeapUnlock
GetLogicalProcessorInformation
SetErrorMode
TzSpecificLocalTimeToSystemTime
IsValidLocale
TlsSetValue
CreateDirectoryW
GetSystemDefaultUILanguage
IsWow64Process
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
CreateEventW
WaitForMultipleObjectsEx
GetVolumePathNameW
GetThreadLocale
SetThreadLocale
SHGetFolderPathW
GetModuleInformation
GetProcessMemoryInfo
EnumProcessModules
GetModuleFileNameExW
CoSetProxyBlanket
PropVariantClear
CoInitializeEx
CoInitialize
CoCreateGuid
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
GetCursorInfo
GetParent
TranslateMessage
MonitorFromRect
EnumDisplayMonitors
CharLowerBuffW
PeekMessageW
GetSystemMetrics
MessageBoxW
CharUpperBuffW
DrawIconEx
GetClientRect
DestroyIcon
IsWindowVisible
GetIconInfo
GetAncestor
GetDesktopWindow
ClientToScreen
DispatchMessageW
EnumWindows
GetMonitorInfoW
MonitorFromPoint
CharUpperW
GetWindow
GetWindowRect
GetForegroundWindow
GetWindowLongPtrW
GetShellWindow
GetWindowThreadProcessId
CharNextW
GetDC
LoadStringW
ReleaseDC
SysAllocStringLen
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantClear
SysFreeString
SysReAllocStringLen
VariantChangeType
SafeArrayCreate
RegSetValueExW
RegFlushKey
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
GetObjectW
DeleteObject
SelectObject
DeleteDC
BitBlt
CreateDIBSection
CreateCompatibleDC
NtQueryInformationThread
NoGCLayPipe
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ