Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
4538006368d35114ebbe3e2ed923980d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4538006368d35114ebbe3e2ed923980d.exe
Resource
win10v2004-20231215-en
Target
4538006368d35114ebbe3e2ed923980d
Size
566KB
MD5
4538006368d35114ebbe3e2ed923980d
SHA1
74cf788fdacdc72b3b642fb969274fb49ed88838
SHA256
2374faf470a9755905047fa2bb9e38e067439f6b84dc4b274ba959aed528ca32
SHA512
fa128e540dbf5eedfe184094c6ee9dbe49dfbe7168bf0bc396d6ae88435ce3b2f763e112a3253478b5545a2cb3165073726b0fb95aef5f14337524ec3601fb4f
SSDEEP
12288:T3HH3U90HdIcK1VK+3ZxDL3bVAlVcvLCZT:jHk9gYVD/P3Se8
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FindClose
LoadLibraryExW
VirtualUnlock
LoadLibraryA
GetTickCount
GetModuleHandleA
CreateThread
VirtualAllocEx
GetProcAddress
CreateEventW
TerminateProcess
GetThreadPriority
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
HeapSize
VirtualQuery
InterlockedExchange
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
GetSystemInfo
LoadCursorW
MessageBoxA
GetDC
DestroyWindow
LoadCursorA
IsWindowVisible
LoadBitmapA
ord165
SHCreateDirectoryExA
send
select
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ