Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft PID Checker/Microsoft PID Checker.exe
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
Microsoft PID Checker/Microsoft PID Checker.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Microsoft PID Checker/ProductKeyUtilities.dll
Resource
win10-20240214-en
Behavioral task
behavioral4
Sample
Microsoft PID Checker/ProductKeyUtilities.dll
Resource
win10v2004-20231215-en
Target
Microsoft PID Checker.zip
Size
1.8MB
MD5
f1894b7713591af59b65497c1ecaf47d
SHA1
b198a2b8a489f7e2d43ddc3271198a0f38427997
SHA256
e864b0f3448f3031c90f369f8c52b3e8bc2790f7b97ab40a74ae79a597d213c7
SHA512
716a88a736a1a17000cf12dd7d1318e3581199fc5660ba938dd333c1ffc114dcfca8d54c64665ea2c7509fdba3f65a69aae28c3f54e175a6203b88c5b659329b
SSDEEP
49152:syREAr5AfMiR4e/FaTd3LvO9KPGeAD81rIs:syREAr5+MiR4tNvOAemqs
Checks for missing Authenticode signature.
resource |
---|
unpack001/Microsoft PID Checker/Microsoft PID Checker.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
pidgenx.pdb
wcsncmp
_itow_s
memmove
_wcsicmp
_onexit
_wcsnicmp
_itow
_ui64tow_s
_except_handler4_common
__dllonexit
_unlock
_lock
_initterm
malloc
free
_amsg_exit
_XcptFilter
_purecall
_vsnwprintf
wcschr
_wtoi
wcsstr
_CIlog10
_ftol2
memcmp
memcpy
memset
HeapAlloc
GetProcAddress
GetProcessHeap
SetLastError
GetVersionExA
GetLastError
LocalAlloc
LocalFree
CloseHandle
CreateFileW
GetFileSize
ReadFile
SetFilePointer
MultiByteToWideChar
WideCharToMultiByte
ExpandEnvironmentStringsW
GetCurrentProcess
TerminateProcess
GetCurrentThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleExW
HeapFree
IsProcessorFeaturePresent
InitializeCriticalSection
SystemTimeToFileTime
GetLocalTime
GetProcessAffinityMask
GetThreadPriority
WaitForMultipleObjects
GetVersionExW
GetSystemDefaultLangID
FileTimeToSystemTime
FreeLibrary
SetThreadPriority
FreeLibraryAndExitThread
VirtualQuery
GetModuleFileNameW
LoadLibraryExW
CreateThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateEventW
CreateSemaphoreW
InitializeCriticalSectionAndSpinCount
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
RaiseException
WaitForSingleObject
ReleaseSemaphore
SetEvent
TraceMessage
CryptExportKey
CryptVerifySignatureA
CryptSignHashA
CryptDecrypt
CryptEncrypt
CryptGenKey
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptAcquireContextW
CryptReleaseContext
CryptGenRandom
RpcStringFreeW
UuidFromStringW
I_RpcMapWin32Status
UuidToStringW
BCryptGenRandom
GetPKeyData
PidGenX
PidGenX2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ