Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
22087312e11f579d71022364620800e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
22087312e11f579d71022364620800e0N.exe
Resource
win10v2004-20240730-en
Target
22087312e11f579d71022364620800e0N.exe
Size
157KB
MD5
22087312e11f579d71022364620800e0
SHA1
b7abb82b46130c58afcdbc114d000eceb6779d31
SHA256
f541e6bafc1ee1e12dcbbd59e28ae31c69db4a3025824f6ba03cad8b33f79fda
SHA512
73ba3afa0dc4d799d4f8d0456543b92fafffa662d3c9576f2c5155a1bf7c68dce81b93f751dfee1591bda47d8cf0e6f9d77fac9647dd210a3a6d05ceccafd6f0
SSDEEP
3072:DamSJZ3hAvp3xrMENXLcfG2lQBV+UdE+rECWp7hKg4NR:Y/3hAvp3j3BV+UdvrEFp7hKhR
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\zoomcode\EP\Bin\Release\NewWebLauncher\NewZoomWebLauncher.pdb
CryptStringToBinaryA
CryptImportPublicKeyInfo
CertGetNameStringA
CryptDecodeObjectEx
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WTHelperGetProvSignerFromChain
WinVerifyTrust
PathIsRelativeA
StrStrA
ord155
StrCmpNIA
LocalFree
HeapAlloc
HeapFree
GetProcessHeap
MultiByteToWideChar
GetProcAddress
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapUnlock
HeapLock
HeapWalk
GetCurrentThreadId
GetVersion
GetCurrentProcessId
CreateSemaphoreA
VerifyVersionInfoA
GetWindowsDirectoryA
GetCommandLineA
GetStartupInfoA
FindFirstFileA
FindClose
InitializeCriticalSection
TerminateThread
LeaveCriticalSection
ExitThread
EnterCriticalSection
DeleteCriticalSection
CreateThread
FreeLibrary
SetLastError
SetEndOfFile
SystemTimeToFileTime
CompareFileTime
FileTimeToSystemTime
GetFileTime
DeleteFileA
CreateDirectoryA
MoveFileExA
GetCurrentProcess
Sleep
CreateProcessA
CopyFileA
GetTempFileNameA
OpenMutexA
GetTempPathA
GetSystemTime
SetUnhandledExceptionFilter
ExitProcess
GetFileAttributesA
VerSetConditionMask
CloseHandle
ReleaseMutex
CreateMutexA
GetLocalTime
FlushFileBuffers
WriteFile
WaitForSingleObject
SetFilePointer
CreateFileA
GetModuleFileNameA
GetLastError
ReleaseSemaphore
DestroyWindow
EndPaint
IsWindowVisible
IntersectRect
FillRect
RegisterClassA
GetClassInfoA
UnregisterClassA
LoadStringA
GetWindowThreadProcessId
LoadCursorA
MapWindowPoints
GetSystemMetrics
FrameRect
SetWindowPos
GetWindowLongA
GetForegroundWindow
InflateRect
SendMessageA
SetFocus
LoadIconA
AttachThreadInput
GetWindowRect
DrawTextA
IsIconic
RegisterClassExA
SetActiveWindow
PostQuitMessage
SetPropA
SetWindowLongA
InvalidateRect
CreateWindowExA
DefWindowProcA
ShowWindow
IsWindow
UpdateWindow
MoveWindow
PostMessageA
FindWindowA
GetDesktopWindow
PostThreadMessageA
GetMessageA
SetTimer
KillTimer
TranslateMessage
PeekMessageA
ShowWindowAsync
GetPropA
GetClientRect
SetForegroundWindow
BeginPaint
DispatchMessageA
GetStockObject
SetTextColor
CreateFontIndirectA
SetBkMode
GetObjectA
SelectObject
DeleteObject
CreateSolidBrush
RegQueryValueExA
CryptHashData
CryptDestroyHash
CryptVerifySignatureA
CryptDestroyKey
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
GetUserNameA
RegOpenKeyExA
RegCloseKey
SHGetFolderPathA
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ