Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
1c09331c164762530458d63b7e50ea859cf281aaf9ffd2d37767912ad4be0aa8N.exe
Resource
win7-20240708-en
Target
1c09331c164762530458d63b7e50ea859cf281aaf9ffd2d37767912ad4be0aa8N.exe
Size
2.3MB
MD5
694b77aa5496a67799f17bf4ecf54440
SHA1
f5aef9f593d0793843661c14cd6a6ed155cb1e43
SHA256
1c09331c164762530458d63b7e50ea859cf281aaf9ffd2d37767912ad4be0aa8
SHA512
4dd417ba37bf67220b7f9c5897f4c72c9d1e70fc3b9926f10296d0d96e2a67f7e8bbb966fbc55721396afec9cc40b827661b9f65ba25245115856df1ec788ff2
SSDEEP
24576:CqZOzvILGQENV0I1ImmxVykKpZ3U6mFd7YgHV+NXOZgG8qb34LRzUAWT7rN2m5BN:CqZsILvENVwVykmNU60dicDD4RuM8F
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FlushFileBuffers
SetStdHandle
HeapReAlloc
VirtualAlloc
HeapAlloc
CreateFileA
WriteFile
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetCPInfo
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
CloseHandle
HeapFree
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
GetOEMCP
LoadLibraryA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
GetModuleFileNameA
LCMapStringW
SetEndOfFile
ReadFile
LoadLibraryExA
ExitProcess
GetVersion
GetACP
GetProcAddress
GetCommandLineW
GetLastError
LeaveCriticalSection
ClearCommError
ConvertDefaultLocale
CreateFileMappingA
CreateFileMappingW
GetTimeZoneInformation
GetTimeFormatA
GlobalLock
ClearCommBreak
CallNamedPipeW
CancelIo
RaiseException
BackupSeek
GetVolumeInformationW
GlobalUnlock
AllocConsole
BackupRead
CreateIoCompletionPort
BackupWrite
AreFileApisANSI
OpenProcess
VirtualProtect
SetFileAttributesA
AddAtomA
RemoveDirectoryA
ResumeThread
SizeofResource
GetSystemDirectoryW
GetDateFormatA
lstrcmpiA
CompareFileTime
GetTempPathA
GetQueuedCompletionStatus
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetStdHandle
RtlUnwind
SetFilePointer
MessageBoxA
wsprintfA
GetWindowLongA
GetClassLongA
SetWindowLongW
DefWindowProcW
SetWindowPos
DefWindowProcA
LoadStringW
GetSysColor
DestroyWindow
ChangeDisplaySettingsA
TrackPopupMenu
AppendMenuA
BeginPaint
ChangeDisplaySettingsExW
GetWindowLongW
CharUpperA
RegisterClassExW
SetCursor
CloseClipboard
GetParent
GetSubMenu
CharLowerBuffW
GetClassNameA
IsWindowEnabled
CheckDlgButton
OpenClipboard
DestroyMenu
GetClientRect
SetClassLongA
ReleaseDC
TranslateMessage
GetSystemMetrics
GetClipBox
ArcTo
CopyMetaFileW
BitBlt
DeleteObject
DeleteDC
CreateBrushIndirect
GetDeviceCaps
CombineRgn
PtVisible
SetBkColor
SetViewportExtEx
GetWindowExtEx
ScaleWindowExtEx
CloseEnhMetaFile
Arc
CreateFontIndirectA
GetTextColor
RectVisible
GetMapMode
CloseFigure
ColorMatchToTarget
CombineTransform
CreateCompatibleBitmap
CreateColorSpaceW
CreateColorSpaceA
CreateBitmapIndirect
CopyMetaFileA
CopyEnhMetaFileW
CopyEnhMetaFileA
CreateCompatibleDC
SelectObject
SetMapMode
CreateBitmap
AllocateLocallyUniqueId
AbortSystemShutdownA
IsValidSid
RegOpenKeyExW
RegQueryValueExA
RegEnumValueA
RegDeleteValueW
OpenEventLogW
RegOpenKeyW
RegSetValueExA
LookupAccountNameW
EqualSid
RegQueryValueW
RegCreateKeyExA
RegEnumValueW
RegDeleteKeyW
AddAccessDeniedAce
AddAccessAllowedAce
InitializeSid
RegCloseKey
RegDeleteKeyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ