Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2d134c49704bc59fe9e1f54dddace8e1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d134c49704bc59fe9e1f54dddace8e1.exe
Resource
win10v2004-20231215-en
Target
2d134c49704bc59fe9e1f54dddace8e1
Size
566KB
MD5
2d134c49704bc59fe9e1f54dddace8e1
SHA1
1ced33006475570b16b64fccfc15514f1e2079ef
SHA256
1379c32e7df1c4ec17cd060fe51205028b20959251d4a7b2ca810006bb4f6904
SHA512
42c11dcc75638cfbc9550bd165538bad811cfdac28b4533423d5064800aabbd0c4d14c030725ec532acb70a86850dcce2ad5ce88dff6ab6a26e8c4a4704ddcbb
SSDEEP
6144:k3rJjM4pnuvONUttdod+sR/HF2GDKal7pebQkfRORVxSAhPulqYMgDQffEwI:kbGqHUvdod+sBHF2GDLlNeb3++AqQ1I
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualUnlock
LoadLibraryA
GetModuleHandleA
CreateThread
VirtualAllocEx
GetProcAddress
CreateEventW
TerminateProcess
LoadLibraryExW
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetThreadPriority
FindClose
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
HeapSize
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
GetSystemInfo
LoadCursorW
MessageBoxA
DestroyWindow
GetDC
LoadCursorA
IsWindowVisible
RegOpenKeyExA
ord165
SHCreateDirectoryExA
send
select
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ