Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
a2e305ba6f77931ac32a4488e2103667.exe
Resource
win7-20240221-en
Target
a2e305ba6f77931ac32a4488e2103667
Size
541KB
MD5
a2e305ba6f77931ac32a4488e2103667
SHA1
e19f92ce8ce61ace69214e792d10fbdfa5270779
SHA256
d1a4bae9a261feb3c856d3c7493452d88cf52994f92ff4122c16e12fe6f69d51
SHA512
ae7e023cf52a30e137123854c56f933a56d52853e0b180ae3cbbcbfb63647f69a5b9f0e60e958962576bd4eaca97207bd77820e2bbb35e6512ada0d580d19a52
SSDEEP
12288:m2swdmkA0W+HYCTa0oEwd3IaPu74jDJisn9VaBulrknVjHLdkSxK2LeHGW:mwRu0oE6Iwl597uTxKN
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\crxinstall\trunk\Release\spoofpref.pdb
GetComputerNameW
GetProcessHeap
FreeLibrary
WinExec
CreateDirectoryW
ReadFile
SetFileTime
GetProcAddress
GetCurrentDirectoryW
SystemTimeToFileTime
GetFileType
DosDateTimeToFileTime
WriteConsoleW
HeapSize
SetStdHandle
SetEnvironmentVariableW
SetCurrentDirectoryW
LockResource
HeapAlloc
FindResourceW
LoadResource
LoadLibraryW
GetCurrentThread
Sleep
MultiByteToWideChar
GetModuleFileNameW
GetCurrentProcess
SizeofResource
GetShortPathNameA
WideCharToMultiByte
LocalFree
CloseHandle
GetLastError
CreateEventW
CreateFileW
LocalAlloc
TerminateProcess
WriteFile
SetFilePointer
SetLastError
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetEndOfFile
SetFilePointerEx
GetFileSizeEx
HeapFree
GetCommandLineW
GetCommandLineA
GetStdHandle
GetModuleHandleExW
ExitProcess
LoadLibraryExW
RaiseException
RtlUnwind
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
SetEvent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
DecodePointer
EncodePointer
GetModuleHandleW
GetSystemTimeAsFileTime
TlsFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
SetSecurityDescriptorDacl
AccessCheck
SetSecurityDescriptorOwner
EqualSid
AllocateAndInitializeSid
IsValidSecurityDescriptor
OpenProcessToken
FreeSid
InitializeSecurityDescriptor
InitializeAcl
DuplicateToken
GetLengthSid
AddAccessAllowedAce
OpenThreadToken
LookupAccountNameW
SetSecurityDescriptorGroup
GetTokenInformation
CoInitializeEx
CoGetObject
CoUninitialize
RtlFreeHeap
NtClose
LdrEnumerateLoadedModules
NtAllocateVirtualMemory
RtlInitUnicodeString
NtOpenKey
NtEnumerateValueKey
RtlEqualUnicodeString
RtlAllocateHeap
RtlDestroyHeap
RtlCreateHeap
RtlNtStatusToDosError
NtQueryValueKey
RtlReleasePebLock
RtlAcquirePebLock
Netbios
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ