Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
10e1d453d4f9ca05ff6af3dcd7766a17ca1470ee89ba90feee5d52f8d2b18a4c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
10e1d453d4f9ca05ff6af3dcd7766a17ca1470ee89ba90feee5d52f8d2b18a4c.exe
Resource
win10v2004-20240802-en
Target
a984ae30907586fb268e74abbb2316a8.bin
Size
127KB
MD5
55e1c550d34b3b2acb143273bed8610c
SHA1
76629eeca2bca08caaa79f04f7a0d1a457a1bf15
SHA256
86b40102650038f1b2782066643e130912ed1559a421e0421e6b1a58d5255b1c
SHA512
a2f0a6c25e534c9ee22eb19d7ff02c92fce344988878ef991fc4d384a42fca41ea8e3ef96a5badf7d96cd680a8cca33b81b0b99b33c7cada7f256075b1acbd85
SSDEEP
3072:vTeoPDSpa4Kk7dkNXFwrSTsnQ3S5vIbEyNT4cdnLEwy/O:beD5yVOQ39gYj5X
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
DocumentPackage.pdb
BCryptGenRandom
SystemFunction036
RegCreateKeyExW
RegSetValueExW
RegEnumValueW
RegOpenKeyExW
RegCloseKey
GetLastError
GetNativeSystemInfo
SetFilePointerEx
GetConsoleOutputCP
FlushFileBuffers
HeapSize
LCMapStringW
CreateFileW
WriteFile
CloseHandle
GetModuleHandleW
GetProcAddress
CompareStringW
GetFileAttributesW
CreateDirectoryW
CreateProcessW
SetLastError
GetModuleFileNameW
GetTempPathW
GetFullPathNameW
SetFileInformationByHandle
AcquireSRWLockExclusive
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetCurrentThread
HeapFree
HeapReAlloc
GetModuleHandleA
GetStdHandle
GetConsoleMode
WaitForSingleObject
MultiByteToWideChar
WriteConsoleW
FormatMessageW
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
WaitForSingleObjectEx
LoadLibraryA
GetCurrentProcess
GetCurrentProcessId
CreateMutexA
lstrlenW
ReleaseMutex
WideCharToMultiByte
ExitProcess
HeapAlloc
GetProcessHeap
GetCurrentDirectoryW
RtlCaptureContext
GetEnvironmentVariableW
GetStringTypeW
GetFileType
SetStdHandle
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
RaiseException
RtlUnwind
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
DecodePointer
WinHttpQueryHeaders
WinHttpReadData
WinHttpCloseHandle
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpConnect
WinHttpSetOption
WinHttpOpen
ShellExecuteW
SHGetKnownFolderPath
CoTaskMemFree
RtlNtStatusToDosError
NtWriteFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ