Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
ab1f101f6cd7c0cffc65df720b92bc8272f82a1e13f207dff21caaff7675029f.exe
Resource
win7-20240704-en
Target
ab1f101f6cd7c0cffc65df720b92bc8272f82a1e13f207dff21caaff7675029f
Size
298KB
MD5
531341bca3483ea43e5a5afd3ee2f328
SHA1
2279a3a72ee35340b443c55ce2df7090dd6efe60
SHA256
ab1f101f6cd7c0cffc65df720b92bc8272f82a1e13f207dff21caaff7675029f
SHA512
f6d7db245255b7488969d6196d3004c16866afefe46b87a73e8db1e2f6689accb23b4bfdb561632ec7e0c2aede7c9ad0cd2740cf37297078836a73ad4c4e0c05
SSDEEP
6144:2gnSY3FmZ5yFLtT6bXKcxskKAO7BherZsQrIvK:2/Z5yFL5WX9KtLeVFrIC
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\207\11404\Out\Win32\Release\kldw.pdb
GetProcessImageFileNameA
CloseHandle
SetFilePointerEx
LocalFree
GetFileSize
GetExitCodeProcess
HeapFree
EnterCriticalSection
GetCommandLineW
OutputDebugStringA
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
SetFilePointer
GetCurrentThreadId
GetSystemDirectoryA
LoadLibraryW
HeapAlloc
GetLocalTime
GetProcAddress
DeleteCriticalSection
ReadProcessMemory
GetCurrentProcessId
GetProcessHeap
FreeLibrary
VirtualProtect
GetHandleInformation
VirtualAlloc
TerminateProcess
WaitForMultipleObjects
GetProcessId
UnmapViewOfFile
DuplicateHandle
OpenProcess
SetEvent
GetModuleHandleW
InterlockedIncrement
MapViewOfFile
InitializeCriticalSectionAndSpinCount
OutputDebugStringW
RaiseException
DecodePointer
ExitProcess
GetSystemDirectoryW
LoadLibraryExW
SetEndOfFile
ReadConsoleW
WriteConsoleW
DeleteFileW
GetDiskFreeSpaceExW
GetLastError
GetVersion
CreateFileW
WaitForSingleObject
FindClose
WriteFile
GetCurrentProcess
FindNextFileW
FindFirstFileW
CompareFileTime
ReadFile
MultiByteToWideChar
WideCharToMultiByte
GetStringTypeW
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
FindFirstFileExW
GetModuleHandleExW
FreeResource
LockResource
LoadResource
FindResourceW
RtlUnwind
GetCommandLineA
HeapReAlloc
GetStdHandle
GetACP
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
HeapSize
RegQueryValueExW
RegEnumKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryInfoKeyW
LookupPrivilegeValueW
SetSecurityDescriptorDacl
SetEntriesInAclA
AdjustTokenPrivileges
SetFileSecurityW
AllocateAndInitializeSid
OpenProcessToken
FreeSid
InitializeSecurityDescriptor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ