Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
fd6e2f33026fce1aa5aa63e32a93e8addfc7fd4b8ac705091e8abba659a3738aN.exe
Resource
win7-20240903-en
Target
fd6e2f33026fce1aa5aa63e32a93e8addfc7fd4b8ac705091e8abba659a3738aN.exe
Size
526KB
MD5
9fc842a582aae3332ce75e0db2e8d7e0
SHA1
c58b11cafbed6433c2929d2cefd619cc52b6bace
SHA256
fd6e2f33026fce1aa5aa63e32a93e8addfc7fd4b8ac705091e8abba659a3738a
SHA512
a67fa786ca2c9a6033eb27633ccaf609cf061143cec1d97cada7a83006e3e418449ee0c3cbba608b3fa2545fcb12a532bbfc392112fd198673b043085115db87
SSDEEP
12288:YyDFmi9r/axbpN6e5QYJh055ohPZi2UnBjvrEH7yjujT:7FmOitpNtxh0sPZpUlrEH7/
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\ESP_src\Win\ijs_win\ESP\vc12\Release\IJPLMSVC.pdb
PathFileExistsW
PathQuoteSpacesW
PathIsDirectoryW
PathAppendW
Sleep
GetVersionExW
GetSystemDefaultLCID
CreateEventW
WaitForSingleObject
GetExitCodeProcess
OpenMutexW
GetModuleFileNameW
GetFileAttributesW
GetConsoleCP
HeapSize
SetStdHandle
GetSystemDefaultLangID
SetEvent
GetLocalTime
GetSystemTimeAsFileTime
FindNextFileW
FindFirstFileW
FindClose
lstrcmpW
lstrcpyW
lstrcmpiW
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
WritePrivateProfileStringW
GetPrivateProfileStringW
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetLastError
CreateMutexW
CloseHandle
LoadLibraryW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetSystemDirectoryW
SetLastError
lstrlenW
GlobalFree
GlobalAlloc
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
CreateFileW
WriteConsoleW
LocalFree
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCPInfo
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
LoadLibraryExW
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetACP
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
ClosePrinter
OpenPrinterW
XcvDataW
EnumPrintersW
GetPrinterDriverW
ReportEventW
ConvertStringSecurityDescriptorToSecurityDescriptorW
DeregisterEventSource
RegisterEventSourceW
DuplicateTokenEx
CreateProcessAsUserW
RegisterServiceCtrlHandlerExW
DeleteService
QueryServiceStatus
ControlService
StartServiceW
ChangeServiceConfig2W
CreateServiceW
SetServiceStatus
UnlockServiceDatabase
CloseServiceHandle
ChangeServiceConfigW
OpenServiceW
LockServiceDatabase
OpenSCManagerW
StartServiceCtrlDispatcherW
RegOpenKeyW
RegEnumValueW
RegEnumKeyW
ImpersonateLoggedOnUser
OpenProcessToken
RegCreateKeyExW
RegOpenCurrentUser
RevertToSelf
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SHCreateDirectoryExW
SHGetSpecialFolderPathW
SHGetFolderPathW
CoUninitialize
CoInitialize
WTSQueryUserToken
WTSFreeMemory
WTSEnumerateSessionsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ