Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
2d3b887fb08bbb375154c932c83610a4faf1b2c3a9835b808b89f8afb712e2a7.exe
Resource
win7-20240903-en
Target
2d3b887fb08bbb375154c932c83610a4faf1b2c3a9835b808b89f8afb712e2a7
Size
706KB
MD5
d106edfc950981210c470842e9764b59
SHA1
2a665fc6f9dde65fc2aad7f01eb479a1df19fbc4
SHA256
2d3b887fb08bbb375154c932c83610a4faf1b2c3a9835b808b89f8afb712e2a7
SHA512
5a2df0c4b44262af75ecc9175e443e10f9af96a5716e96438e614abf38f9db530ba958d135c80fcd0cb763dc737845d60772c172705b146cbceda807318e2bb0
SSDEEP
12288:v1s7dma5sX09Ond4zFHj5V/NDUSKdzWLYWa2jGPFA3Ts9y156BjvrEH7O:v4mA5ZDUjaEWljGu3T4KMrEH7O
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\DRM_Client_Build\workspace\fph\label\DRM_Client_Slave\fphVista\Release\fph.pdb
PathRemoveFileSpecA
PathStripPathA
PathFileExistsW
EnumProcessModules
GetProcessImageFileNameA
GetModuleFileNameExA
GetModuleFileNameExW
IsBadReadPtr
GetModuleFileNameW
VirtualProtect
VirtualFree
GetSystemDirectoryA
VirtualQuery
VirtualAlloc
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateFileW
CreateProcessA
TerminateProcess
GetExitCodeProcess
GetTickCount
OpenMutexA
CreateMutexA
ReleaseMutex
ExitProcess
LoadLibraryW
WaitForMultipleObjects
CreateThread
HeapAlloc
VerifyVersionInfoA
VerSetConditionMask
LocalFree
DisconnectNamedPipe
WaitForMultipleObjectsEx
ConnectNamedPipe
CreateNamedPipeW
GetOverlappedResult
WaitNamedPipeW
GetVersionExA
GetUserDefaultLangID
LocalAlloc
Process32NextW
Process32FirstW
CreateFileMappingW
GetFileSize
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileTime
CreateDirectoryW
DeviceIoControl
GetWindowsDirectoryA
GetSystemDirectoryW
GetSystemWow64DirectoryW
GetVolumeInformationA
MulDiv
GetSystemWow64DirectoryA
SetEnvironmentVariableA
CompareStringW
GetMailslotInfo
GetProcessHeap
SetEndOfFile
GetSystemInfo
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
InterlockedExchange
InitializeCriticalSectionAndSpinCount
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
SetConsoleCtrlHandler
FlushFileBuffers
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetStdHandle
HeapDestroy
HeapCreate
HeapReAlloc
FatalAppExitA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentThread
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
DeleteFileA
CreateEventA
GetStartupInfoA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetSystemTimeAsFileTime
ExitThread
HeapFree
RtlUnwind
GetFileAttributesW
GetLocalTime
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcess
LoadLibraryA
GetCurrentThreadId
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
GetCommandLineA
IsDBCSLeadByte
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
InterlockedIncrement
OpenProcess
SetEvent
GetModuleFileNameA
FreeLibrary
Sleep
ResetEvent
GetCurrentProcessId
GetTimeZoneInformation
ProcessIdToSessionId
GlobalAlloc
ReadFile
GlobalFree
lstrcmpiA
lstrlenA
GetProcAddress
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
WaitForSingleObject
GetModuleHandleA
GetLastError
CreateFileA
WriteFile
CloseHandle
CreateMailslotA
OpenMutexW
SetFilePointer
CreateMutexW
CompareStringA
OpenClipboard
wsprintfW
CreateWindowExA
RegisterClassA
CharNextA
PostMessageA
FindWindowA
InvalidateRect
GetProcessWindowStation
PostThreadMessageA
DestroyWindow
TranslateMessage
LoadCursorA
RegisterClassExW
GetSystemMetrics
CreateWindowExW
ShowWindow
UpdateWindow
DefWindowProcW
GetWindowDC
DrawTextW
EndPaint
RedrawWindow
SetWindowLongA
UnregisterClassW
LoadStringW
RegisterWindowMessageA
GetClassNameW
CountClipboardFormats
GetClipboardOwner
GetForegroundWindow
IsClipboardFormatAvailable
GetClassNameA
GetClientRect
GetAsyncKeyState
GetClipboardData
BeginPaint
CloseClipboard
EmptyClipboard
EnumDisplayDevicesA
EnumDisplaySettingsA
GetDC
IsWindowVisible
GetAncestor
IsIconic
LoadBitmapA
SetClipboardData
ReleaseDC
GetDesktopWindow
GetWindowRect
SendMessageTimeoutA
ChangeClipboardChain
SetClipboardViewer
IsWindow
DefWindowProcA
GetWindowLongA
LoadStringA
MessageBoxA
SetTimer
GetMessageA
DispatchMessageA
KillTimer
GetDeviceCaps
CreateFontW
GetTextExtentPointW
CreateDCW
SetBitmapBits
GetSystemPaletteEntries
SetStretchBltMode
StretchBlt
GetBitmapBits
CreateDIBSection
CreatePen
MoveToEx
LineTo
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
CreateDCA
BitBlt
DeleteDC
CreateSolidBrush
GetObjectA
PatBlt
DeleteObject
GetStockObject
RegEnumKeyExW
ConvertSidToStringSidW
RegOpenKeyExW
RegQueryValueExW
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatusEx
RegQueryInfoKeyW
RegEnumValueW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
GetSecurityInfo
ConvertStringSidToSidW
SetEntriesInAclW
SetSecurityInfo
RegEnumKeyExA
RegQueryValueExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
GetTokenInformation
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoUninitialize
CoInitialize
CoInitializeSecurity
CoInitializeEx
VarUI4FromStr
VariantClear
LoadRegTypeLi
SysStringLen
SysFreeString
UnRegisterTypeLi
LoadTypeLi
SysAllocString
VariantInit
UuidToStringA
RpcStringFreeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ