Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
Zoom_c137bee198809de9.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Zoom_c137bee198809de9.exe
Resource
win10v2004-20230703-en
Target
Zoom_c137bee198809de9.exe
Size
65KB
MD5
99aa0b8e1492eea2f85f5788566f47ec
SHA1
355ea316c02b4d6e89a6e30268844d029a9319ab
SHA256
8b29ecc34bc14ff7acceae355657b1226cf022af9e3252c3c72b75d4b62f6e7a
SHA512
a6c8e066a2a54feac26be7652a92c76c1d84f63f6e212201a6f252ed77989e651473dea955abceee910e42b083a30253ab5dbd0f82e1174583c89760112d4af0
SSDEEP
1536:zoWYZeUtIqyluTWAp9PDxeG8D3qd8IAAL/V7mkRZ1:8WYZeUSqykWqxA7qFAAJR7
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CryptStringToBinaryA
CryptBinaryToStringA
GetCurrentProcessId
CreateSemaphoreA
ReleaseSemaphore
VerSetConditionMask
GetWindowsDirectoryA
GetCommandLineA
VerifyVersionInfoA
GetStartupInfoA
FindFirstFileA
FindClose
GetModuleHandleA
InitializeCriticalSection
TerminateThread
LeaveCriticalSection
ExitThread
EnterCriticalSection
DeleteCriticalSection
CreateThread
FreeLibrary
GetProcAddress
GetVersion
SetEndOfFile
SystemTimeToFileTime
CompareFileTime
FileTimeToSystemTime
GetFileTime
DeleteFileA
GetFileAttributesA
CreateDirectoryA
MoveFileExA
GetCurrentProcess
Sleep
CreateProcessA
CopyFileA
GetTempFileNameA
OpenMutexA
GetTempPathA
LocalFree
GetSystemTime
SetUnhandledExceptionFilter
ExitProcess
GetLastError
GetCurrentThreadId
HeapWalk
HeapLock
HeapUnlock
GetModuleFileNameA
GetSystemTimeAsFileTime
GetProcessHeap
GetTickCount
HeapFree
QueryPerformanceCounter
HeapAlloc
CloseHandle
ReleaseMutex
CreateMutexA
GetLocalTime
FlushFileBuffers
WriteFile
WaitForSingleObject
SetFilePointer
CreateFileA
LoadLibraryA
IsWindowVisible
IntersectRect
FillRect
RegisterClassA
GetClassInfoA
UnregisterClassA
LoadStringA
GetWindowThreadProcessId
LoadCursorA
MapWindowPoints
GetSystemMetrics
FrameRect
SetWindowPos
GetWindowLongA
GetForegroundWindow
InflateRect
SendMessageA
SetFocus
LoadIconA
AttachThreadInput
SetForegroundWindow
DrawTextA
IsIconic
RegisterClassExA
SetActiveWindow
PostQuitMessage
EndPaint
DestroyWindow
GetWindowRect
ShowWindowAsync
GetPropA
GetClientRect
BeginPaint
SetPropA
SetWindowLongA
InvalidateRect
CreateWindowExA
DefWindowProcA
ShowWindow
IsWindow
UpdateWindow
MoveWindow
PostMessageA
FindWindowA
GetDesktopWindow
GetMessageA
SetTimer
KillTimer
TranslateMessage
PeekMessageA
DispatchMessageA
PostThreadMessageA
DeleteObject
CreateFontIndirectA
GetObjectA
GetStockObject
SetTextColor
SelectObject
SetBkMode
CreateSolidBrush
CryptGetHashParam
CryptHashData
CryptDestroyHash
GetLengthSid
GetUserNameA
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
CopySid
GetTokenInformation
ConvertSidToStringSidA
RegOpenKeyExA
OpenProcessToken
SHGetFolderPathA
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ