Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
1eb0f155204823a63b7f053ea3908ced652f84d0b618a43d550c81209445c562.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1eb0f155204823a63b7f053ea3908ced652f84d0b618a43d550c81209445c562.exe
Resource
win10v2004-20221111-en
Target
1eb0f155204823a63b7f053ea3908ced652f84d0b618a43d550c81209445c562
Size
1.4MB
MD5
11d1ee6994aed726b699bc4162090d42
SHA1
b069d427b9da6e7c247c2bfd909d0dfddcd68be7
SHA256
1eb0f155204823a63b7f053ea3908ced652f84d0b618a43d550c81209445c562
SHA512
d8d75a00a21f61d1920e9184c8376f4e3d6cd60a4bef4451981263b3f172a13d753d6098fc6aeec226e24f14d212f5fc6741a78f6896a0051bc0f7f1b182c4e8
SSDEEP
24576:xrK6dClXmekxlm1dl4r260n4dz0as5jc3AZ1COwiUP/5lq8AL:xrBew72604doSw6ewE
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
LoadResource
InterlockedDecrement
GetModuleHandleW
WideCharToMultiByte
VirtualFreeEx
LoadLibraryW
SizeofResource
FreeConsole
ReadProcessMemory
CreateProcessA
TerminateProcess
GetModuleFileNameW
MultiByteToWideChar
GetLastError
GetProcAddress
VirtualAlloc
VirtualAllocEx
LockResource
GetModuleFileNameA
WriteProcessMemory
ResumeThread
GetCommandLineW
EncodePointer
DecodePointer
HeapFree
HeapAlloc
RaiseException
RtlUnwind
SetLastError
InterlockedIncrement
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetProcessHeap
GetFileType
DeleteCriticalSection
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
FindResourceW
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
Sleep
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
OutputDebugStringW
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
HeapDestroy
FindResourceExW
GetThreadContext
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
LocalFree
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
CoSetProxyBlanket
CoInitializeEx
CoUninitialize
CoCreateInstance
CoInitializeSecurity
SysAllocStringByteLen
SysStringByteLen
SysFreeString
VariantClear
PathFindFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ