Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2aa40d52ef7c4329d7192db537dc1336ec469fafa2ea23a46889c1d2e668505c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2aa40d52ef7c4329d7192db537dc1336ec469fafa2ea23a46889c1d2e668505c.exe
Resource
win10v2004-20230220-en
Target
2aa40d52ef7c4329d7192db537dc1336ec469fafa2ea23a46889c1d2e668505c
Size
2.8MB
MD5
15b9baec90943ba8d0f531dc10cc0572
SHA1
e8805e85797d3fd7adb430050b3e0e677e3e5105
SHA256
2aa40d52ef7c4329d7192db537dc1336ec469fafa2ea23a46889c1d2e668505c
SHA512
7a069d825d6df7323b7f41e0defaec17d366f3a49a96042e8edb7cbe6d83ec7ccd8a4154bd11e4c8d8213cbe43ec215df61b41a0b86bf36733ce19620f84c124
SSDEEP
49152:hvVhWLuxBnHT/edIv/d2emTzGe5JlWkTkCYT4ennRTOj/pMNwi:YEnHTwTrWkFUTOj/pywi
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
SERIALNUMBER=91310115591679552Q,CN=Shanghai 2345 Mobile Technology Co.\, Ltd.,O=Shanghai 2345 Mobile Technology Co.\, Ltd.,ST=Shanghai,C=CN,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.2=#13085368616e67686169,1.3.6.1.4.1.311.60.2.1.3=#1302434e
CN=DigiCert EV Code Signing CA (SHA2),OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
lstrcmpiW
LoadLibraryExW
GetModuleFileNameW
GetModuleHandleW
FindResourceW
IsBadStringPtrW
MultiByteToWideChar
VirtualAllocEx
VirtualFreeEx
OpenProcess
CreateRemoteThread
WriteProcessMemory
SetEvent
ResetEvent
WaitForSingleObject
OpenMutexW
CreateEventW
LoadLibraryA
QueryDosDeviceW
SizeofResource
GetLogicalDriveStringsW
VirtualQuery
GetUserDefaultLangID
WriteFile
CreateFileW
GetModuleHandleExW
CreateMutexW
ReleaseMutex
GetCurrentProcessId
HeapAlloc
LocalFree
GetProcessHeap
CreateDirectoryW
GetWindowsDirectoryW
WriteConsoleW
SetStdHandle
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
LoadResource
WaitForMultipleObjects
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
GetProcAddress
FreeLibrary
CloseHandle
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetErrorMode
GetLastError
RaiseException
DecodePointer
GetEnvironmentVariableW
FileTimeToLocalFileTime
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
GetTimeZoneInformation
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
SearchPathW
GetVersionExW
LockResource
GetSystemInfo
ResumeThread
OpenEventW
Sleep
GetCurrentProcess
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
GetACP
WideCharToMultiByte
GetVolumeInformationW
GetDiskFreeSpaceW
GetDriveTypeW
FindFirstFileW
GetLongPathNameW
GetShortPathNameW
GetFileAttributesExW
ExpandEnvironmentStringsW
TryEnterCriticalSection
InitializeCriticalSection
LoadLibraryW
HeapFree
GetComputerNameExW
GlobalAlloc
GlobalFree
FindNextFileW
FindClose
LocalFileTimeToFileTime
FileTimeToSystemTime
RtlUnwind
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
FileTimeToDosDateTime
ReadFile
SetFileTime
SetFilePointer
SetEndOfFile
GetFileSize
GetFileTime
GetFullPathNameW
lstrlenW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
GetSystemDirectoryW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
MoveFileExW
CopyFileW
GetTempFileNameW
MoveFileW
GetTickCount
DeviceIoControl
SetLastError
GlobalMemoryStatusEx
lstrcatW
lstrcpyW
GetFileSizeEx
CreateProcessW
GetExitCodeProcess
FormatMessageW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
GetLocalTime
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
VirtualQueryEx
CreateThread
GetProcessId
OpenThread
TerminateThread
GetThreadContext
SuspendThread
ReleaseSemaphore
CreateSemaphoreW
DuplicateHandle
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
GetStdHandle
GetFileType
RtlUnwindEx
RtlPcToFileHeader
InterlockedPushEntrySList
InterlockedFlushSList
ExitThread
FreeLibraryAndExitThread
ExitProcess
GetModuleFileNameA
SetConsoleCtrlHandler
GetCurrentThread
HeapSize
HeapReAlloc
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
CharNextW
PostThreadMessageW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
UnregisterClassW
SetSecurityDescriptorDacl
ReportEventW
RegisterEventSourceW
DeregisterEventSource
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
InitializeAcl
GetLengthSid
AddAccessAllowedAce
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
VarUI4FromStr
SysFreeString
PathFileExistsW
SHGetFolderPathW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ