Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
e468fe744cbaebc00b08578f6c71fbc0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e468fe744cbaebc00b08578f6c71fbc0N.exe
Resource
win10v2004-20240802-en
Target
e468fe744cbaebc00b08578f6c71fbc0N.exe
Size
262KB
MD5
e468fe744cbaebc00b08578f6c71fbc0
SHA1
2ae65aadb9ab82d190bdcb080e00ff9414e3c933
SHA256
7c75c35f4222e83088de98ba25595eb76013450fc959d7feefcab592d1c9839f
SHA512
184a6f2378463c3ccc0f491f4a12d6cac38b10a916c8525a27acd91f681eb8fb0be956fc4bdb99e5a6c7b76f871069f939c996e93a68ff0a6c305195a6049276
SSDEEP
6144:5lUSzoSYslEktrv4V6n7GdVOLXEAONKcXY8dh+LIm:1oSYslEktrv4VsLXESsYMh+LB
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
MicrosoftEdgeUpdateCore_unsigned.pdb
GetModuleHandleW
GetProcAddress
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
SetLastError
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCurrentThread
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
HeapAlloc
LCMapStringW
GetFileType
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
CreateFileW
WriteConsoleW
SizeofResource
LockResource
FindResourceExW
LoadResource
FindResourceW
lstrlenW
lstrcmpiW
CreateDirectoryW
GetEnvironmentVariableW
WaitForSingleObject
ReleaseMutex
GetTickCount
CreateProcessW
TryEnterCriticalSection
InitializeCriticalSection
CreateMutexW
Sleep
GetShortPathNameW
GetSystemDirectoryW
VirtualQuery
SetFilePointer
GetFileAttributesExW
MoveFileExW
GetPrivateProfileIntW
OutputDebugStringA
GetFileInformationByHandle
GetLocalTime
lstrcmpW
GetVersionExW
VerSetConditionMask
VerifyVersionInfoW
lstrcpynW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
InitOnceExecuteOnce
GetComputerNameExW
VirtualProtect
VirtualAlloc
GetSystemInfo
InitializeCriticalSectionEx
RaiseException
CloseHandle
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
HeapFree
LoadLibraryExA
StringFromGUID2
IIDFromString
CoInitializeEx
CoUninitialize
wsprintfW
wvsprintfW
MessageBoxW
SetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
CharUpperW
CharLowerW
CharLowerBuffW
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
GetTraceEnableLevel
RegisterTraceGuidsW
UnregisterTraceGuids
EventWriteTransfer
EventRegister
EventUnregister
MakeSelfRelativeSD
RegQueryValueExW
RegEnumValueW
GetSecurityDescriptorLength
RegOpenKeyExW
RegSetValueExW
GetSecurityDescriptorControl
RegCreateKeyExW
RegQueryInfoKeyW
RegCloseKey
GetTokenInformation
MakeAbsoluteSD
OpenThreadToken
GetLengthSid
InitializeAcl
InitializeSecurityDescriptor
OpenProcessToken
AddAce
IsValidSid
ImpersonateLoggedOnUser
GetSecurityDescriptorOwner
InitializeSid
CopySid
GetSidLengthRequired
GetSidSubAuthority
GetSecurityDescriptorGroup
EqualSid
GetAclInformation
GetSecurityDescriptorDacl
RevertToSelf
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
SHGetFolderPathW
PathCommonPrefixW
PathStripPathW
PathRemoveExtensionW
PathRemoveFileSpecW
SHQueryValueExW
PathAppendW
PathCanonicalizeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ