Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
7ededf6fdbdbb73b0b1f48de22006f90.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ededf6fdbdbb73b0b1f48de22006f90.exe
Resource
win10v2004-20231215-en
Target
7ededf6fdbdbb73b0b1f48de22006f90
Size
1.0MB
MD5
7ededf6fdbdbb73b0b1f48de22006f90
SHA1
78c4b9c9c3be51f3e76188f38ccd246f138e1fe2
SHA256
366af94b66908ef51a3fbd0a266b8cab7346981f558f90996fa5dffe2383f684
SHA512
1043aa3a9ba834e3ea17d737a355054b2a4f12c7360a35a37ced8e27199016d0c93d96b879bcf8d5d736e2300e5c2918eb2afcf79d98159c771c60a117488910
SSDEEP
24576:GIcNUDrfFMNj59Ly1w90L8gS7QF6JI5qgFTPoa:PcNErK5y1w9g8D7HOqgFTPoa
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\perforce\gmancz_win_workspace2\3am\products\irv\1_1_0_native\host\out\x86\release\packed\joinme.pdb
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
FreeResource
LockResource
lstrlenA
GetProcessHeap
CreateProcessA
FormatMessageA
MoveFileExA
GetWindowsDirectoryA
lstrcatA
WriteFile
GetModuleFileNameA
LoadResource
HeapAlloc
GetShortPathNameA
CreateFileA
OpenProcess
CreateDirectoryA
SetCurrentDirectoryA
GetExitCodeProcess
HeapFree
GetLastError
FindResourceA
SetLastError
GetTempPathA
RtlUnwind
lstrcpyA
SizeofResource
WaitForSingleObject
lstrcmpA
GetStdHandle
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetCurrentProcess
TerminateProcess
GetTempFileNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
CloseHandle
DeleteFileA
MessageBoxA
wvsprintfA
wsprintfA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
SHGetFolderPathA
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ