Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
566d92f857b8a790d34be4a63db3d452.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
566d92f857b8a790d34be4a63db3d452.exe
Resource
win10v2004-20231215-en
Target
566d92f857b8a790d34be4a63db3d452
Size
318KB
MD5
566d92f857b8a790d34be4a63db3d452
SHA1
c2dafba40ba737b8b7eaf8f1d8a5110bb7d23162
SHA256
248ef7cf55ba333899fff14e9d6ea8d0621f9a2c495edf5af243de845aa50524
SHA512
f2e7ef5b65538e7edd9de76a8d56a7a9bd2e4ec72c2f87b17cefe390555cab5e763eb64a7a41e8f9dcb422c465e439bf0e8fed77e7dc98cdc166c39bf53a8bb0
SSDEEP
6144:K/7nEQ0yyyOszpA0sUe6fFvs6eRLKue/KHgopIUEOD/YKB6EWL:ip0uNAXUe6fneRLKue/KHgF50Y9L
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
VerQueryValueW
GetCurrentThreadId
WriteFile
GetCommandLineW
GetTickCount
GetSystemTimeAsFileTime
ExitProcess
VirtualAlloc
ReadFile
lstrcmpiA
LockResource
GetLastError
CloseHandle
CreateFileMappingA
GetCurrentProcess
GetModuleHandleA
GetVersion
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetStringTypeW
GetEnvironmentVariableA
GetFileType
TlsGetValue
GetStartupInfoA
GetVersionExA
DeleteFileW
GetModuleHandleW
GetProcAddress
GetCommandLineA
LCMapStringW
GetStringTypeA
GetUserDefaultLangID
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
HeapFree
TerminateProcess
UnhandledExceptionFilter
GetModuleFileNameA
GetSystemMetrics
CreateWindowExA
EndPaint
RegisterClipboardFormatA
ShowWindow
RegisterClassExA
CreateDialogParamA
MessageBoxA
SetBkColor
Rectangle
GetUserNameA
AllocateAndInitializeSid
CoTaskMemAlloc
CoInitialize
SysAllocStringLen
SysReAllocStringLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ