Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
16c3617c70d889623b64d10010307e6d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16c3617c70d889623b64d10010307e6d.exe
Resource
win10v2004-20231215-en
Target
16c3617c70d889623b64d10010307e6d
Size
566KB
MD5
16c3617c70d889623b64d10010307e6d
SHA1
0b89468587f78cef8912a2371a40df3480f325b4
SHA256
79cc3dc626bf48c9c8139f17406fffbe218febabe9a630e94db4e0a597dafd68
SHA512
37e977a9643300d38fd8f2490ec5e53e7f0889348fb8a03af492903db50a6105ecf02c1789f84393a966e9f6ce1a33786b9ed3fe93977720725245f87feae5c7
SSDEEP
6144:XynKawv1QfRkZEjgYyGmY8T3HmCukDVuC95bcEZG0l+wxyPMIKb6pVNghW1sODbt:XuZTY7Vp+Yzy0I/p4WsW1Vqu
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualUnlock
LoadLibraryA
GetModuleHandleA
CreateThread
VirtualAllocEx
GetProcAddress
CreateEventW
TerminateProcess
LoadLibraryExW
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetThreadPriority
FindClose
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
HeapSize
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
GetSystemInfo
LoadCursorW
MessageBoxA
DestroyWindow
GetDC
LoadCursorA
IsWindowVisible
RegOpenKeyExA
ord165
SHCreateDirectoryExA
send
select
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ