Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
f6c01214414fe2cedaa217c69ab093e1.exe
Resource
win7-20231215-en
Target
f6c01214414fe2cedaa217c69ab093e1
Size
533KB
MD5
f6c01214414fe2cedaa217c69ab093e1
SHA1
9ad1924175f70e2055aed95868206a104cd13a69
SHA256
ddc70d4d3326a585b11a55b2ad1dd7e99c9ed4a436bf2f018d37f4f8564f6597
SHA512
7ddcde6ecc70bbf363fd44a02dc4b55535577fbcf3a6e0344911361cdfb4f5fd215a70097e43dc5fcafcde063c8407dc941be14668ca2453a57f153ac850866d
SSDEEP
12288:/OGCYzlMKEp35ENAFgdw9GVIaqgkFKp3PH0Nv4t4dsIxD7yu7YxeC+ShC5KfoeIZ:/06+Fgm0VIxgkg1twxSu7VCthCofSZ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetComputerNameW
GetProcessHeap
FreeLibrary
WinExec
CreateDirectoryW
ReadFile
SetCurrentDirectoryW
GetCurrentDirectoryW
SystemTimeToFileTime
GetFileType
DosDateTimeToFileTime
WriteConsoleW
HeapSize
SetStdHandle
SetEnvironmentVariableW
HeapAlloc
GetCurrentThread
FindResourceW
LoadResource
LoadLibraryW
LockResource
SetFilePointer
Sleep
MultiByteToWideChar
GetModuleFileNameW
GetCurrentProcess
SizeofResource
GetModuleFileNameA
GetShortPathNameA
WideCharToMultiByte
LocalFree
CloseHandle
GetLastError
CreateEventW
CreateFileW
LocalAlloc
TerminateProcess
WriteFile
SetFileTime
SetLastError
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetEndOfFile
SetFilePointerEx
GetFileSizeEx
HeapFree
GetCommandLineW
GetCommandLineA
GetStdHandle
GetModuleHandleExW
ExitProcess
LoadLibraryExW
RaiseException
RtlUnwind
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
SetEvent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
DecodePointer
EncodePointer
GetModuleHandleW
GetSystemTimeAsFileTime
TlsFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
SetSecurityDescriptorDacl
AccessCheck
SetSecurityDescriptorOwner
EqualSid
AllocateAndInitializeSid
IsValidSecurityDescriptor
OpenProcessToken
FreeSid
InitializeSecurityDescriptor
InitializeAcl
DuplicateToken
GetLengthSid
AddAccessAllowedAce
OpenThreadToken
LookupAccountNameW
SetSecurityDescriptorGroup
GetTokenInformation
CoInitializeEx
CoGetObject
CoUninitialize
RtlFreeHeap
NtClose
LdrEnumerateLoadedModules
NtAllocateVirtualMemory
RtlInitUnicodeString
NtOpenKey
NtEnumerateValueKey
RtlEqualUnicodeString
RtlAllocateHeap
RtlDestroyHeap
RtlCreateHeap
RtlNtStatusToDosError
NtQueryValueKey
RtlReleasePebLock
RtlAcquirePebLock
Netbios
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ