Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageKeyEncipherment
Static task
static1
Behavioral task
behavioral1
Sample
2eac878299644e267fe29e0ce965e366fc52dee07c911ad6f3650fc89d696ec6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2eac878299644e267fe29e0ce965e366fc52dee07c911ad6f3650fc89d696ec6.exe
Resource
win10v2004-20220901-en
Target
2eac878299644e267fe29e0ce965e366fc52dee07c911ad6f3650fc89d696ec6
Size
1.2MB
MD5
2e35c18ad40af6d6ef4f0474ba32fb88
SHA1
f0065b0527ba49d30cf326fe581e595ac9dea19b
SHA256
2eac878299644e267fe29e0ce965e366fc52dee07c911ad6f3650fc89d696ec6
SHA512
9f63b608ac77716f8f5b51eeb42bd88693d7e80582b7a2ad1e3f2fd0b7abe7585e151f405cc7c311eaf900c005797b30f69f451f0b6231e3c2f4bc5252666517
SSDEEP
6144:QR+CD2LcU2JWQCLjrDQZw9vUyaxmfd6l3hhXIr71ai:S+6Ct2ALXrDQAUNxm16l3hhXIr71Z
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageKeyEncipherment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentDirectoryW
GetCurrentProcessId
ExitProcess
GetProcAddress
GetCurrentThreadId
WriteFile
LoadLibraryA
GetCommandLineA
HeapAlloc
GetLastError
SetLastError
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
GetModuleHandleExW
MultiByteToWideChar
GetStdHandle
GetModuleFileNameW
GetProcessHeap
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsDebuggerPresent
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
HeapFree
Sleep
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
OutputDebugStringW
LoadLibraryW
RtlUnwind
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
OpenProcessToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ