Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageKeyEncipherment
Static task
static1
Behavioral task
behavioral1
Sample
92af28e8bc16171ac8db3bf1e557bee4.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
92af28e8bc16171ac8db3bf1e557bee4.exe
Resource
win10v2004-20240508-en
Target
92af28e8bc16171ac8db3bf1e557bee4.bin
Size
2.0MB
MD5
92af28e8bc16171ac8db3bf1e557bee4
SHA1
cf246770e904a4b2046841d55b8b88fa8587f482
SHA256
1a00eb1a3fce9419459d70f241af7ec1db5cf4e3240a22e90e0c6c3d77a10ffa
SHA512
e7c09a02f7d9c30b984c058cd4fba4f60c61d0f7d2410002035c029926b01d059c57e99b07e6c00573006578847460d0248bdbdbf042226719b586a68fe4c563
SSDEEP
6144:X/iYLRtJ0Q9PC9YfLtB81sOFPk9n/IFPrWgFo9qZI+ZkQjfz:P7tJxKufJB8iOK9QFjWgFo9qZPZkQjfz
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageKeyEncipherment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentDirectoryW
GetCurrentProcessId
ExitProcess
GetProcAddress
GetCurrentThreadId
WriteFile
LoadLibraryA
HeapAlloc
GetCommandLineA
EncodePointer
DecodePointer
GetLastError
InterlockedDecrement
GetModuleHandleExW
MultiByteToWideChar
GetStdHandle
GetModuleFileNameW
GetProcessHeap
SetLastError
InterlockedIncrement
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
Sleep
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
LoadLibraryW
RtlUnwind
HeapSize
HeapReAlloc
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
OpenProcessToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ