Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
16df09995c2382ff06a39a1588487ebec12105fc5da0e38c142fe72b3e6c9e9e.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
16df09995c2382ff06a39a1588487ebec12105fc5da0e38c142fe72b3e6c9e9e.exe
Resource
win10v2004-20240802-en
Target
16df09995c2382ff06a39a1588487ebec12105fc5da0e38c142fe72b3e6c9e9e
Size
395KB
MD5
ec258260bfebb72b29aff73996557002
SHA1
8b69149f12cf16e8c036ebaafd6b56efa66abc62
SHA256
16df09995c2382ff06a39a1588487ebec12105fc5da0e38c142fe72b3e6c9e9e
SHA512
404c56c1a6c3b5c8fa41884d21934a0657805c2cffc8965e57f8fb0df91b410a516541dc8e33713a1268a56eb8392622c4e440177e0115eb409a5682d35d2364
SSDEEP
3072:jAF5//Hnwhj8ME2lkemoQHHXPI5OWQvrtoM1oDBB6fePTSM40VO19NA5L3o60Vyr:EHXHswoQHHXPI5meMUl3OkLKlQMibp9N
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
F:\x5\AvoidRandomKill-main\x64\Release\uedit64.pdb
OpenProcess
GetTickCount
VirtualAlloc
GetCurrentThread
VirtualFree
VirtualQueryEx
IsBadReadPtr
IsBadWritePtr
WriteConsoleW
GetCurrentProcessId
VirtualProtect
Sleep
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
GetModuleHandleW
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
GetProcAddress
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualProtectEx
SetLastError
LoadLibraryExW
RtlPcToFileHeader
RtlUnwindEx
GetModuleFileNameW
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
HeapSize
HeapReAlloc
CloseHandle
CreateFileW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ