Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
50d4decc4dd68ac62a944dbfafc540fa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50d4decc4dd68ac62a944dbfafc540fa.exe
Resource
win10v2004-20231215-en
Target
50d4decc4dd68ac62a944dbfafc540fa
Size
318KB
MD5
50d4decc4dd68ac62a944dbfafc540fa
SHA1
4a092a2f51c7d7d8f38dad89e2bead6c44b8a471
SHA256
10ccb882e16c3d34040a0986bef2830e2e137e94ce007759c0f62e86dfb298b1
SHA512
0aa026c06f55926716faae6dc5f39a3617a88f4b9dbae484d7551bb7efeba650fc264a0f31ac76dca912c4b41ae7939bf0b1199d406b24b1eb10b3197b93d963
SSDEEP
6144:FqNBvRJvlYJ8VamVV/XnsStFt7wv+BNe9p/iL2P2WESgs:FqrvRJ9YJ8Va282tWQoj+W7gs
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HttpEndRequestA
CloseHandle
CreateFileA
GetSystemTimeAsFileTime
GetLastError
GetCommandLineA
QueryPerformanceCounter
lstrcmpiA
GetVersionExA
GetProcAddress
GetVersion
WriteFile
ExitProcess
VirtualAlloc
GetModuleHandleW
GetCommandLineW
ReadFile
CreateThread
SetCurrentDirectoryW
CreateFileMappingA
DeleteFileW
InterlockedDecrement
GetTempPathA
GetSystemInfo
GetStringTypeExA
FreeResource
InterlockedIncrement
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
FlushFileBuffers
SetStdHandle
HeapReAlloc
FreeEnvironmentStringsW
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
GetCurrentThreadId
GetCurrentProcessId
LCMapStringW
LCMapStringA
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetEndOfFile
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
GetModuleHandleA
GetStartupInfoA
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
SetHandleCount
CreateWindowExA
GetSystemMetrics
RegisterClassExA
Rectangle
RegCreateKeyExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ