Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2fb88d9a3ee228deab8ce5e93ed4c5db.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2fb88d9a3ee228deab8ce5e93ed4c5db.exe
Resource
win10v2004-20231215-en
Target
2fb88d9a3ee228deab8ce5e93ed4c5db
Size
562KB
MD5
2fb88d9a3ee228deab8ce5e93ed4c5db
SHA1
6da01ec29dfed1ac1219fe8279046a43e3f52897
SHA256
06b880b802c5fb3b0a69d48dc77348b006402bf78f1ee043ea4e5732df4e4006
SHA512
95a241274f0e1335e2c3b71b3f8b295f938b6f299037f2583ba183c8ce49f925e2a19a58b5827ee808848a60e3238bfd68e05132de5a0458e561da0d7204ba28
SSDEEP
6144:+h3S3trxOY+qSNPxHACuUXPXdDcdJMc5cDCftH0kTR7I6NkGp+BwrdsejaQKXdes:+9QOY+qSNPxHNX/5iJrLt3zN1QGhjCf
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
OpenEventA
VirtualAlloc
GetProcAddress
CreateEventA
OpenSemaphoreA
GetModuleHandleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
LoadLibraryA
LoadLibraryExA
VirtualProtect
FindClose
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
HeapSize
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
GetSystemInfo
LoadIconW
SetWindowRgn
GetDesktopWindow
LoadCursorA
IsWindowVisible
LoadBitmapW
CreateBitmap
SelectObject
CreatePen
ord165
VariantCopy
recv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ