Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
virussign.com_676e04af4cc30777acd455aca8321a20.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
virussign.com_676e04af4cc30777acd455aca8321a20.dll
Resource
win10v2004-20240426-en
Target
virussign.com_676e04af4cc30777acd455aca8321a20.vir
Size
103KB
MD5
676e04af4cc30777acd455aca8321a20
SHA1
9623f07bef906a416d375598dfefddd520792f8b
SHA256
53e54b4ee7ee4e744cfe9c1788ecfd78dafb7e61f1330fc0ff0c7967d48b3037
SHA512
8d36084c02e40466a64ebce06668bfec73bcfb867f0907d63d29de147adda7b139a34c20ab1824bc8c906d576dc8c20d5cf85845e4dcb726c3620ccd9be78852
SSDEEP
1536:fiTGdGp61mdYxSoaOCe0ikL27vxp+tN4GS57PtXDwjRugt9wT:fiwlZaLan57PtXDMO
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\mybuilds\ms_inbox\amity2\hcwcpem\objfre_wlh_x86\i386\hcwCPem.pdb
InterlockedDecrement
lstrlenW
lstrlenA
GetModuleFileNameA
GetSystemInfo
VirtualFree
GetCurrentThreadId
VirtualAlloc
GetModuleHandleW
GetCommandLineA
GetVersionExA
RtlUnwind
HeapFree
HeapAlloc
RaiseException
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
FreeLibrary
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapReAlloc
HeapSize
OutputDebugStringA
WriteFile
GetConsoleCP
GetConsoleMode
InterlockedIncrement
LoadLibraryA
GetCPInfo
GetACP
GetOEMCP
Sleep
SetFilePointer
SetStdHandle
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
VirtualQuery
DisableThreadLibraryCalls
GetVersion
GetModuleHandleA
GetProcAddress
GetCurrentProcess
MultiByteToWideChar
CreateEventW
CreateThread
WaitForMultipleObjects
SetEvent
WaitForSingleObjectEx
GetLastError
TerminateThread
ResetEvent
GetTickCount
GetVersionExW
GetCurrentProcessId
CloseHandle
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapCreate
FlushFileBuffers
RegSetValueExW
RegCreateKeyW
RegEnumKeyExW
RegDeleteKeyW
LookupAccountNameA
AllocateAndInitializeSid
GetKernelObjectSecurity
GetSecurityDescriptorDacl
GetLengthSid
GetSecurityDescriptorLength
InitializeSecurityDescriptor
InitializeAcl
AddAccessDeniedAce
AddAccessAllowedAce
GetAce
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
SetKernelObjectSecurity
FreeSid
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegSetValueW
RegOpenKeyExW
CoCreateInstance
CoUninitialize
CoFreeUnusedLibraries
StringFromGUID2
GetRunningObjectTable
CreateItemMoniker
CoInitialize
KsSynchronousDeviceControl
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ