Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
56fab7dc0dfe1673295bed79543af36e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56fab7dc0dfe1673295bed79543af36e.exe
Resource
win10v2004-20231222-en
Target
56fab7dc0dfe1673295bed79543af36e
Size
117KB
MD5
56fab7dc0dfe1673295bed79543af36e
SHA1
8f1684507c3c08f26dea7d06bf4acac4764dac3a
SHA256
22a0a69fa36d98e48723ad92a10491b6abf198e4d114c6902358e6ffc736e5aa
SHA512
02db9b41c3642e9e1caba7fc5c7af9fc138564950a113320ac5d936f96c13b9f79dd1b942c5a8abc07d63043c09e3e75a7d8ab0950140d7ab5e05efcb58aa2a7
SSDEEP
1536:PCOV9tYASQmsuPbFuy3PTyZubtmi1OvjO+UMjsJcFscNsWjcdTmZGCdj7wVYU6Z:6etYTQ0puy3Pzm0+FxyCZGGjMVYh
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
LockResource
OpenThread
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
Sleep
LoadResource
SizeofResource
FindClose
GetModuleHandleA
FindResourceW
FindResourceExW
GetTempPathA
GetDiskFreeSpaceA
CreateFileA
GetFileAttributesA
FindFirstFileA
FindNextFileA
CopyFileA
WideCharToMultiByte
EncodePointer
DecodePointer
RaiseException
RtlUnwind
AreFileApisANSI
MultiByteToWideChar
GetSystemTimeAsFileTime
GetCommandLineA
GetStdHandle
WriteFile
GetModuleFileNameW
IsProcessorFeaturePresent
HeapAlloc
HeapFree
InterlockedDecrement
ExitProcess
GetModuleHandleExW
HeapSize
IsDebuggerPresent
SetLastError
InterlockedIncrement
GetCurrentThreadId
MoveFileExW
GetTimeZoneInformation
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetProcessHeap
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
LCMapStringW
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetStringTypeW
FlushFileBuffers
SetStdHandle
WriteConsoleW
CloseHandle
CreateFileW
HeapDestroy
DeleteCriticalSection
InitializeCriticalSection
UnhandledExceptionFilter
GetProcAddress
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
SHCreateDirectoryExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ