Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
289a88c6d3043b36e8e6981677cb0be70bea163865ea5acb4a095c2140838080N.exe
Resource
win7-20240903-en
Target
289a88c6d3043b36e8e6981677cb0be70bea163865ea5acb4a095c2140838080N.exe
Size
998KB
MD5
6d462c97b1af7db933ed18efdda46660
SHA1
837698c96b11aa344e170b46bf623be5f97e6a30
SHA256
289a88c6d3043b36e8e6981677cb0be70bea163865ea5acb4a095c2140838080
SHA512
ea0b41b1bcb0732246d824ed4e7061201bcf06c23a9a449d08894decd0c54dc8382a6d52717a68dcee9a922024a33d5368800d70010cf2813b16d509054ebfe0
SSDEEP
12288:vZBI1dxpQXJIpbRi7i4DK+TxDTjTaDTjTvDTjTnC8EBjvrEH7c:BBMdxp7Nh4DpTt+Pu8urEH7c
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\Users\rajashen\Desktop\Installer_V3\release\ViewUserGuide.pdb
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
SetFilePointer
FlushFileBuffers
GetFullPathNameW
SetErrorMode
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
RtlUnwind
ExitProcess
RaiseException
HeapReAlloc
HeapSize
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentDirectoryA
GetDriveTypeA
SetEnvironmentVariableA
lstrlenA
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedDecrement
FileTimeToLocalFileTime
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GlobalAddAtomW
FreeResource
lstrlenW
WritePrivateProfileStringW
GlobalUnlock
MulDiv
GetModuleHandleA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpW
GetModuleHandleW
GetCurrentProcessId
SetLastError
ReadFile
FileTimeToSystemTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFileTime
MultiByteToWideChar
GetCurrentProcess
GetVersionExW
CompareFileTime
GetFileTime
CreateDirectoryW
Sleep
CopyFileW
FreeLibrary
GetProcAddress
LoadLibraryW
SetEndOfFile
LocalFree
FormatMessageW
CreateFileW
CloseHandle
GetTickCount
GetStdHandle
WriteFile
WideCharToMultiByte
GetTimeFormatW
GetSystemTime
GetUserDefaultUILanguage
RemoveDirectoryW
GetThreadLocale
FindClose
FindNextFileW
FindFirstFileW
MoveFileExW
GetTempFileNameW
GetTempPathW
SetFileAttributesW
DeleteFileW
GlobalFree
GlobalAlloc
GetModuleFileNameW
OutputDebugStringW
FindResourceW
LoadResource
LockResource
SizeofResource
ReleaseMutex
GetLastError
CreateMutexW
GetFileType
DestroyMenu
LoadCursorW
GetSysColorBrush
ShowWindow
SetWindowTextW
IsDialogMessageW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextW
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
UnregisterClassA
SetForegroundWindow
UpdateWindow
GetMenu
UnregisterClassW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
GetSysColor
EndPaint
BeginPaint
ClientToScreen
GrayStringW
CreateWindowExW
DrawTextExW
DrawTextW
TabbedTextOutW
PostMessageW
PostQuitMessage
SetCursor
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
ReleaseDC
GetDC
CopyRect
GetParent
LoadIconW
LoadBitmapW
GetWindowRect
DrawIcon
EnableWindow
SendMessageW
GetClientRect
GetSystemMetrics
IsIconic
MessageBoxW
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetObjectW
CreateSolidBrush
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
SelectObject
DocumentPropertiesW
OpenPrinterW
ClosePrinter
SetEntriesInAclW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
RegSetValueExW
RegEnumKeyW
RegQueryInfoKeyW
RegQueryValueExW
RegOpenKeyExW
SHGetFolderLocation
SHGetPathFromIDListW
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExW
ord680
InitCommonControlsEx
PathIsDirectoryEmptyW
PathFileExistsW
PathIsDirectoryW
SHDeleteKeyW
SHDeleteEmptyKeyW
PathFindExtensionW
PathFindFileNameW
VariantClear
VariantChangeType
VariantInit
?CI3_Wow64@@YAAAVCWow64@@XZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.