Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
486208acfcb0accd7a7043fd191ee5ba68153dee16891c7eaf36f357a26fec06.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
486208acfcb0accd7a7043fd191ee5ba68153dee16891c7eaf36f357a26fec06.exe
Resource
win10v2004-20220812-en
Target
486208acfcb0accd7a7043fd191ee5ba68153dee16891c7eaf36f357a26fec06
Size
1.4MB
MD5
ca163ecd3c5ffd0766d016d97ec10c3e
SHA1
1de5e16c9d0657bf774cdbe8b0f6fa9ac3a19997
SHA256
486208acfcb0accd7a7043fd191ee5ba68153dee16891c7eaf36f357a26fec06
SHA512
cf614160838327f7c1b8e40ab8383192ec4e65963e6d5d9023f00684037f8cfac5cd8971c7440df38fa23fe1e83f30d046cc7552b225072067545bfbc3e9cd6f
SSDEEP
24576:hrK6dClXmekxlm1dl4r260n4dz0as5jc3AZ1COwiUP/5lq8At:hrBew72604doSw6ewK
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
LoadResource
InterlockedDecrement
GetModuleHandleW
WideCharToMultiByte
VirtualFreeEx
LoadLibraryW
SizeofResource
FreeConsole
ReadProcessMemory
CreateProcessA
TerminateProcess
GetModuleFileNameW
MultiByteToWideChar
GetLastError
GetProcAddress
VirtualAlloc
VirtualAllocEx
LockResource
GetModuleFileNameA
WriteProcessMemory
ResumeThread
GetCommandLineW
EncodePointer
DecodePointer
HeapFree
HeapAlloc
RaiseException
RtlUnwind
SetLastError
InterlockedIncrement
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetProcessHeap
GetFileType
DeleteCriticalSection
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
FindResourceW
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
Sleep
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
OutputDebugStringW
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
HeapDestroy
FindResourceExW
GetThreadContext
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
LocalFree
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
CoSetProxyBlanket
CoInitializeEx
CoUninitialize
CoCreateInstance
CoInitializeSecurity
SysAllocStringByteLen
SysStringByteLen
SysFreeString
VariantClear
PathFindFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ