Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
ab1f101f6cd7c0cffc65df720b92bc8272f82a1e13f207dff21caaff7675029f.exe
Resource
win7-20240705-en
Target
18141272915.zip
Size
193KB
MD5
7dd953ea336dc895261f8d8295bd74a6
SHA1
99352ed72e9d72d24e1befefb8ba19aeccf919a1
SHA256
712935bacfb78c9462cd95531d4188c2f4a929de5c69ca9ff5f1fa89ab35795d
SHA512
2f926496eaecb28b94ca6410464dbf825b3a2c9310df00396b49a0b76614f00a7f6feb2f13688035191c36fb6243b2ea8bc6a7307f634093bdda75e1a9857ed4
SSDEEP
6144:lpFxwGtoCfw9gcGG3U7Kpz6/ulXCCJPAl:nFFt5fwLE74z6/CCyAl
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\207\11404\Out\Win32\Release\kldw.pdb
GetProcessImageFileNameA
CloseHandle
SetFilePointerEx
LocalFree
GetFileSize
GetExitCodeProcess
HeapFree
EnterCriticalSection
GetCommandLineW
OutputDebugStringA
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
SetFilePointer
GetCurrentThreadId
GetSystemDirectoryA
LoadLibraryW
HeapAlloc
GetLocalTime
GetProcAddress
DeleteCriticalSection
ReadProcessMemory
GetCurrentProcessId
GetProcessHeap
FreeLibrary
VirtualProtect
GetHandleInformation
VirtualAlloc
TerminateProcess
WaitForMultipleObjects
GetProcessId
UnmapViewOfFile
DuplicateHandle
OpenProcess
SetEvent
GetModuleHandleW
InterlockedIncrement
MapViewOfFile
InitializeCriticalSectionAndSpinCount
OutputDebugStringW
RaiseException
DecodePointer
ExitProcess
GetSystemDirectoryW
LoadLibraryExW
SetEndOfFile
ReadConsoleW
WriteConsoleW
DeleteFileW
GetDiskFreeSpaceExW
GetLastError
GetVersion
CreateFileW
WaitForSingleObject
FindClose
WriteFile
GetCurrentProcess
FindNextFileW
FindFirstFileW
CompareFileTime
ReadFile
MultiByteToWideChar
WideCharToMultiByte
GetStringTypeW
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
FindFirstFileExW
GetModuleHandleExW
FreeResource
LockResource
LoadResource
FindResourceW
RtlUnwind
GetCommandLineA
HeapReAlloc
GetStdHandle
GetACP
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
HeapSize
RegQueryValueExW
RegEnumKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryInfoKeyW
LookupPrivilegeValueW
SetSecurityDescriptorDacl
SetEntriesInAclA
AdjustTokenPrivileges
SetFileSecurityW
AllocateAndInitializeSid
OpenProcessToken
FreeSid
InitializeSecurityDescriptor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ