Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
abe768936889d0d1d6accb08e007f6a5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abe768936889d0d1d6accb08e007f6a5.exe
Resource
win10v2004-20240226-en
Target
abe768936889d0d1d6accb08e007f6a5
Size
1.0MB
MD5
abe768936889d0d1d6accb08e007f6a5
SHA1
a706211fe11ce130d23c1d7e9fbb8be3cf6aad3b
SHA256
46a19858fdae67330956ded6caf816539c1a1b62eb8dd455293692ab6b44f885
SHA512
5a60dc545d9c4dcf2ef8f340aed6637b215f04602f6b728fac64188316f83720daa4d6af8dc16b5fa36f77234c1e8fb1fe3be332601c163372f2cfaf834fa5f4
SSDEEP
24576:99WC988bu6Co3zZOno39xQ1/UbjSg1wk/h48OcwN2wRzfFooBla4iw:9B88TCo3Wo3He/HgeBRja4iw
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Proyectos\desktop_apps\MainExe_Installers\Installer\Release\InstallerVittalia.pdb
CreateFileA
WriteFile
CloseHandle
DeleteFileA
CreateThread
ExitProcess
Sleep
CreateDirectoryA
MoveFileA
WaitForSingleObject
GetModuleFileNameA
GetFileSize
ReadFile
CreateToolhelp32Snapshot
Process32First
Process32Next
SetFilePointer
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
GetFileAttributesA
SetFileTime
TerminateThread
CreateFileW
WriteConsoleW
SetStdHandle
LockResource
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetFileType
GetCurrentThreadId
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
GetModuleFileNameW
GetStdHandle
HeapSize
AreFileApisANSI
LoadResource
SizeofResource
GetLastError
FindResourceA
SetEndOfFile
ReadConsoleW
EnterCriticalSection
GetModuleHandleExW
EnumSystemLocalesW
GetUserDefaultLCID
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
HeapFree
HeapAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
LCMapStringW
GetLocaleInfoW
IsValidLocale
RegisterClassA
GetClassInfoA
InvalidateRect
wsprintfA
GetWindow
SetForegroundWindow
GetWindowThreadProcessId
GetTopWindow
DefWindowProcA
EndPaint
BeginPaint
MoveWindow
SetWindowLongA
PostQuitMessage
UpdateWindow
ShowWindow
CreateWindowExA
GetSystemMetrics
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
GetWindowLongA
SetDIBitsToDevice
SHGetFolderPathA
ShellExecuteExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ