Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
electrum-4.5.4.exe
Resource
win11-20240426-en
Target
electrum-4.5.4.exe
Size
45.6MB
MD5
a256710277ea6d09b84a1f89a7d47df0
SHA1
e450a42d097e3c108b1f19eaa4084e69c3b86aa1
SHA256
9ad2c2e7e2a7589a104fa0837c59182edde020c3dba0b3578bada8d703edc2af
SHA512
d8d02a8c7d1d646b120b64efa20e9e717884c45bd54b11960687e49db8e70fcd9284e97f6c251d02b8c43ac26534744f7696f0338d77fec7b57d3bf64496f6e7
SSDEEP
786432:DF8WWxUd9d1LRphkc3FphiWGlso5EYWAFPMUcgDB2hREoBQkMGIcmdK19diGgETI:DF8WWxU9ddRzFphiZd5EXUcgD4hzIzsG
resource | yara_rule |
---|---|
sample | pyinstaller |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
ConvertSidToStringSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetTokenInformation
OpenProcessToken
LoadIconMetric
CreateFontIndirectW
DeleteObject
SelectObject
CloseHandle
CreateDirectoryW
CreateProcessW
DeleteCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
FindClose
FindFirstFileExW
FormatMessageW
FreeLibrary
GetCommandLineW
GetCurrentProcess
GetEnvironmentVariableW
GetExitCodeProcess
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoW
GetTempPathW
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LocalFree
MulDiv
MultiByteToWideChar
SetConsoleCtrlHandler
SetDllDirectoryW
SetEnvironmentVariableW
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
__argc
__lconv_init
__mb_cur_max
__p__commode
__p__fmode
__p__wcmdln
__set_app_type
__setusermatherr
__wargv
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_errno
_filelengthi64
_fileno
_findclose
_get_osfhandle
_initterm
_iob
_lock
_onexit
_setmode
_snwprintf
fwprintf
_unlock
_wcsdup
_wfopen
_wfullpath
_wputenv_s
_wremove
_wrmdir
_wtempnam
abort
atoi
calloc
clearerr
exit
fclose
feof
ferror
fflush
fgetpos
fprintf
fputc
fputwc
fread
free
fsetpos
fwrite
iswctype
localeconv
malloc
mbstowcs
memcmp
memcpy
memset
perror
realloc
setbuf
setlocale
signal
strcat
strchr
strcmp
strcpy
strerror
strlen
strncat
strncmp
strncpy
strtok
vfprintf
wcscat
wcschr
wcscmp
wcscpy
wcslen
wcsncpy
wcstombs
_wstat
_wfindnext
_wfindfirst
_stat
_wcsdup
_strdup
_getpid
_fileno
CreateWindowExW
DestroyIcon
DialogBoxIndirectParamW
DrawTextW
EndDialog
GetClientRect
GetDC
GetDialogBaseUnits
GetWindowLongW
InvalidateRect
MessageBoxA
MessageBoxW
MoveWindow
ReleaseDC
SendMessageW
SetWindowLongW
SystemParametersInfoW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ