Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
b0c45827c169df0b99fa9cd7be05dde1650bd2bb539902ca97168a3a515fd6e6N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b0c45827c169df0b99fa9cd7be05dde1650bd2bb539902ca97168a3a515fd6e6N.exe
Resource
win10v2004-20241007-en
Target
b0c45827c169df0b99fa9cd7be05dde1650bd2bb539902ca97168a3a515fd6e6N
Size
165KB
MD5
fa1211e41b143c2b38c7b3dc3db2d580
SHA1
a58e03b6a14df8584b938fbb6248e22c66d406ff
SHA256
b0c45827c169df0b99fa9cd7be05dde1650bd2bb539902ca97168a3a515fd6e6
SHA512
4d56b338c75fbcb9608cff028ce285379e7993bf701a7bfa37608219da34915349ff5c29256b5d82813c374e5f57f0207e879c40ca440d4eaeae1f4cc01f7b1e
SSDEEP
3072:fWMG0BC83uZtGi5jKJZxgedEZ053JfU90WZXP6JvoQnK5+ivgX:fXC83nZSedEZ053Sd6pnc
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleW
GetNumberOfConsoleMouseButtons
GetOEMCP
GetOverlappedResult
GetPrivateProfileIntW
GetPrivateProfileSectionNamesW
GetPrivateProfileSectionW
GetPrivateProfileStringW
GetProcAddress
GetProcessAffinityMask
GetProcessHeap
GetProcessIoCounters
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeA
GetStringTypeExW
GetStringTypeW
GetSystemDefaultLangID
GetSystemDefaultUILanguage
GetSystemDirectoryW
GetSystemInfo
GetSystemPowerStatus
GetSystemTime
GetSystemTimeAsFileTime
GetSystemTimes
GetSystemWindowsDirectoryW
GetTempFileNameW
GetTempPathW
GetThreadLocale
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GetUserDefaultLCID
GetUserDefaultUILanguage
GetVersion
GetVersionExW
GetVolumeInformationW
GetWindowsDirectoryW
GlobalAlloc
GlobalFindAtomA
GlobalFree
GlobalUnWire
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
IsWow64Process
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LockFile
LockResource
MapViewOfFileEx
Module32FirstW
MoveFileW
MulDiv
MultiByteToWideChar
OpenEventA
OpenEventW
OpenMutexA
OpenMutexW
OpenProcess
OpenThread
GetModuleHandleA
PeekNamedPipe
Process32FirstW
Process32NextW
ProcessIdToSessionId
QueryPerformanceCounter
RaiseException
ReadConsoleInputA
ReadDirectoryChangesW
ReadFile
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
ReplaceFile
ResetEvent
ResumeThread
RtlUnwind
ScrollConsoleScreenBufferA
SearchPathA
SetConsoleCtrlHandler
SetConsoleCursorPosition
SetConsoleMode
SetConsoleTextAttribute
SetCurrentDirectoryW
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
SetFilePointerEx
SetFileTime
SetHandleCount
SetLastError
SetNamedPipeHandleState
SetStdHandle
SetThreadLocale
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
SizeofResource
Sleep
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
UnlockFile
UnmapViewOfFile
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualLock
WTSGetActiveConsoleSessionId
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleOutputCharacterA
WriteConsoleW
WriteFile
WritePrivateProfileSectionW
WritePrivateProfileStringW
_lclose
_lcreat
_llseek
_lopen
_lread
_lwrite
lstrcatA
lstrcmpA
lstrcmpiA
lstrcmpiW
lstrcpyA
lstrcpynA
lstrcpynW
lstrlen
lstrlenA
lstrlenW
GetModuleFileNameW
GetModuleFileNameA
GetLongPathNameW
GetLogicalDrives
GetLocaleInfoW
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameA
GetFileType
GetFileTime
GetFileSizeEx
GetFileSize
GetFileAttributesW
GetFileAttributesExW
GetFileAttributesExA
GetFileAttributesA
GetExitCodeThread
GetExitCodeProcess
GetEnvironmentStringsW
GetEnvironmentStrings
GetDriveTypeA
GetDiskFreeSpaceExW
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCurrentDirectoryA
GetConsoleScreenBufferInfo
GetConsoleOutputCP
GetConsoleMode
GetConsoleCP
GetConsoleAliasesW
GetCommandLineW
GetCommandLineA
GetCommState
GetCPInfoExA
GetCPInfo
GetAtomNameW
GetACP
FreeResource
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FreeConsole
FormatMessageW
FormatMessageA
FlushInstructionCache
FlushFileBuffers
FindResourceW
FindResourceExW
FindNextFileW
FindFirstFileW
FindFirstFileA
FindCloseChangeNotification
FindClose
FindAtomW
FillConsoleOutputCharacterA
FillConsoleOutputAttribute
FileTimeToSystemTime
FileTimeToLocalFileTime
FatalAppExitA
ExitThread
ExitProcess
EnumSystemLocalesA
EnterCriticalSection
DuplicateHandle
DosDateTimeToFileTime
DisconnectNamedPipe
DeviceIoControl
DeleteVolumeMountPointW
DeleteFileW
DeleteFileA
DeleteCriticalSection
DeleteAtom
CreateWaitableTimerA
CreateToolhelp32Snapshot
CreateThread
CreateSemaphoreW
CreateSemaphoreA
CreateRemoteThread
CreateProcessW
CreateNamedPipeW
CreateMutexW
CreateMutexA
CreateFileW
CreateFileMappingW
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryW
CreateDirectoryA
CopyFileW
CopyFileExA
ConnectNamedPipe
CompareStringW
CompareStringA
CompareFileTime
CloseHandle
CancelIo
OutputDebugStringW
AddAtomW
PostThreadMessageW
MessageBoxW
LoadStringW
GetMessageW
DispatchMessageW
CharNextW
wvsprintfW
SetTextColor
SetRectRgn
SetROP2
SetDIBColorTable
SelectObject
RoundRect
PolyBezier
PlayMetaFile
PATHOBJ_bEnum
LPtoDP
HT_Get8BPPMaskPalette
GetTextExtentPointI
GetTextExtentPoint32W
GetStockObject
GetOutlineTextMetricsW
GetObjectW
GetLogColorSpaceA
GetEnhMetaFileDescriptionW
GetCharWidthInfo
GetCharABCWidthsI
GetCharABCWidthsFloatA
GetBkMode
GdiValidateHandle
GdiEntry9
GdiCreateLocalEnhMetaFile
ExtCreatePen
EngReleaseSemaphore
EngFillPath
EngDeletePath
DeviceCapabilitiesExW
DeleteObject
DeleteDC
CreatePolygonRgn
CreateFontW
CreateFontIndirectW
CreateEllipticRgn
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CloseMetaFile
BitBlt
AngleArc
SwapBuffers
UnloadNetworkFonts
cGetTTFFromFOT
StartServiceW
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
SetEntriesInAclW
RevertToSelf
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyW
RegOpenKeyExW
RegOpenKeyExA
RegNotifyChangeKeyValue
RegEnumKeyExW
RegEnumKeyExA
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyA
RegCloseKey
ReadEventLogW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
OpenProcessToken
OpenEventLogW
LookupPrivilegeValueW
LookupAccountSidW
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
GetUserNameW
GetTokenInformation
GetNamedSecurityInfoW
FreeSid
EqualSid
DuplicateTokenEx
DuplicateToken
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
CreateWellKnownSid
ConvertStringSidToSidW
ConvertSidToStringSidW
CloseServiceHandle
CloseEventLog
CheckTokenMembership
AllocateAndInitializeSid
AdjustTokenPrivileges
RegOpenKeyA
DragQueryFileA
Shell_NotifyIconW
ShellExecuteW
ShellExecuteExW
ShellExecuteA
SHLoadInProc
SHGetSpecialFolderPathW
SHGetMalloc
SHGetIconOverlayIndexW
SHGetFolderPathW
SHGetFolderPathA
SHFileOperationA
SHCreateDirectoryExW
SHChangeNotify
ExtractAssociatedIconExW
AssocQueryStringW
ColorHLSToRGB
ColorRGBToHLS
PathAddBackslashW
PathAppendW
PathCombineA
PathCombineW
PathCompactPathW
PathFileExistsA
PathFileExistsW
PathFindExtensionW
PathFindFileNameA
PathFindFileNameW
PathIsDirectoryW
PathIsPrefixW
PathRemoveBackslashW
PathRemoveExtensionW
PathRemoveFileSpecW
PathStripPathW
SHDeleteKeyW
SHDeleteValueA
SHDeleteValueW
SHGetValueA
SHGetValueW
SHSetValueA
SHSetValueW
StrCmpIW
StrCmpNA
StrRStrIW
StrStrIW
StrStrW
wnsprintfW
ord17
ImmDisableIME
ImmGetContext
ImmGetOpenStatus
ImmReleaseContext
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ