Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
00ac4cdc5087cd29f202e546b186cd960f989812fadec932e97ad1ddb921699a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
00ac4cdc5087cd29f202e546b186cd960f989812fadec932e97ad1ddb921699a.exe
Resource
win10v2004-20221111-en
Target
00ac4cdc5087cd29f202e546b186cd960f989812fadec932e97ad1ddb921699a
Size
719KB
MD5
073d75f4c4361b664ad6e1316363ad1c
SHA1
548a829800393a567a0c9c5a00d82538b9309451
SHA256
00ac4cdc5087cd29f202e546b186cd960f989812fadec932e97ad1ddb921699a
SHA512
62a7d1415810f4c244e35f76e34b1e63f3227808297009005a3ee3947dac5a1fb2187370ed9b0f61063191da428f74c493645941a9ac075808805df238dd3cf8
SSDEEP
12288:Q+Ukqlfvse4lgNAxHOu8cUtmVmqLKMv6s83NAzqlpJvWyhFSl1RbbCyUucqGevvf:rmse42+xLPV5p6wwDRhFu1RbzvcKf
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileMappingA
CreateMutexW
GetCurrentProcess
MapViewOfFileEx
FlushFileBuffers
WritePrivateProfileStringW
OpenMutexW
CreateProcessA
HeapSize
GetComputerNameA
CreateEventA
MoveFileA
WaitForSingleObjectEx
FindNextFileW
CreateDirectoryW
QueueUserWorkItem
GetDiskFreeSpaceExW
GetVolumeNameForVolumeMountPointW
GetEnvironmentVariableA
ResumeThread
ResetEvent
TerminateThread
CreateFileMappingW
GetStartupInfoA
OpenFileMappingW
ExitThread
OutputDebugStringW
SetHandleCount
GetTimeZoneInformation
HeapCreate
GetComputerNameExW
GetConsoleScreenBufferInfo
GetNamedPipeInfo
GetShortPathNameW
PostQueuedCompletionStatus
GetTempPathA
EraseTape
LocalFlags
GetPriorityClass
QueryInformationJobObject
GetEnvironmentStrings
LCMapStringA
VirtualAllocEx
GetProcessWorkingSetSize
GetConsoleWindow
CreateWaitableTimerA
EnumCalendarInfoExW
OpenEventA
GetLongPathNameA
DeleteAtom
SetNamedPipeHandleState
SetConsoleDisplayMode
GetConsoleAliasExesW
SetEndOfFile
EnumCalendarInfoA
SetErrorMode
SetEvent
CopyFileA
Toolhelp32ReadProcessMemory
GetThreadTimes
SetVolumeMountPointA
SetMailslotInfo
OpenMutexA
OpenSemaphoreW
ReplaceFileA
GetFullPathNameW
IsDBCSLeadByteEx
GetThreadContext
CompareStringW
CreateToolhelp32Snapshot
SetConsoleTextAttribute
GetCalendarInfoW
GetCPInfo
GetCurrentDirectoryA
VerifyVersionInfoW
EnumCalendarInfoExA
MapUserPhysicalPagesScatter
FreeLibraryAndExitThread
GetCommandLineA
HeapSetInformation
GetStartupInfoW
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapAlloc
HeapReAlloc
IsProcessorFeaturePresent
CryptReleaseContext
RegDeleteValueA
RegSetValueExA
GetSecurityDescriptorDacl
IsValidSecurityDescriptor
CryptDestroyHash
SetNamedSecurityInfoW
GetSecurityDescriptorOwner
RegOpenKeyW
OpenProcessToken
QueryServiceConfigW
CryptHashData
RegCloseKey
OpenSCManagerW
OpenThreadToken
RegSetValueW
RegCreateKeyExA
CryptGenRandom
ReportEventW
RegCreateKeyA
CheckTokenMembership
CopySid
RegOpenKeyA
LsaClose
RegEnumKeyW
SetSecurityDescriptorOwner
GetTokenInformation
SetThreadToken
RegFlushKey
SetSecurityDescriptorDacl
IsValidSid
RegEnumValueA
ChangeServiceConfigW
SetEntriesInAclW
RegEnumKeyExA
OpenSCManagerA
SetFileSecurityW
DuplicateTokenEx
DeregisterEventSource
GetSidSubAuthorityCount
AddAce
RegDeleteKeyW
InitializeSecurityDescriptor
GetSecurityDescriptorControl
CreateWellKnownSid
RegDeleteValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ