Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
pmAdRe.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
pmAdRe.exe
Resource
win10v2004-20240802-en
Target
pmAdRe.exe
Size
46KB
MD5
4cfa2580d4b2f0170a4a4d45a6fc545e
SHA1
3b0d5f7456367a227947f1ee2d329f0bb66842a8
SHA256
c0ef1b0e900a9300a7ba57f7fd9850c1287e129b86a800d8b09c9dd952a0f249
SHA512
ca1b407c572dcd4a7561b3e26ee557148c75a1fe46205dccde021ae1bce286d88e9198a76d2deaa8557c21817507616451ea1ce3f84b1b61bd5bb2f79cb2cdfb
SSDEEP
768:JmCgon/kuaiayz8kH+4TYCh4ZxEKAMUpOAJuOUSKy5VwEkN9NDGSw3hOv:JzzjapyzvH+4TVhqSKBqO5WwEkzC3hOv
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord2691
ord300
ord3178
ord265
ord910
ord316
ord1611
ord305
ord1603
ord1258
ord1254
ord820
ord817
ord4392
ord5963
ord2539
ord941
ord798
ord945
ord1137
ord793
ord4434
ord4409
ord6783
ord4159
ord6781
ord4733
ord2251
ord2206
ord6018
ord4165
ord1046
ord5533
ord6721
ord5813
ord4199
ord2087
ord3209
ord5657
ord5659
ord2447
ord4333
ord4981
ord5663
ord5646
ord6001
ord2766
ord2978
ord3107
ord4714
ord2961
ord3110
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4890
ord4667
ord3659
ord589
ord4952
ord4029
ord1607
ord310
ord601
ord3213
ord800
ord1276
_setmbcp
_controlfp_s
_invoke_watson
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
_time64
_access
_localtime64_s
_strdup
_strlwr
isdigit
atoi
atol
memcpy
sprintf
memset
__CxxFrameHandler3
_stricmp
WriteFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetModuleHandleW
SetFileAttributesA
lstrcmpiA
GetModuleFileNameA
OutputDebugStringA
GetLastError
GetSystemDirectoryA
GetVersionExA
GetSystemInfo
lstrcpyA
GetPrivateProfileStringA
CreateFileA
ReadFile
SetFilePointer
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
OpenProcess
TerminateProcess
Sleep
DeleteFileA
GetModuleHandleA
GetCurrentProcess
DuplicateHandle
GetExitCodeProcess
GetProcAddress
CreateRemoteThread
WaitForSingleObject
CloseHandle
SetLastError
PostMessageA
IsWindow
GetWindowThreadProcessId
FindWindowA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyA
AdjustTokenPrivileges
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
SHGetSpecialFolderPathA
ShellExecuteA
PathStripPathA
VariantTimeToSystemTime
SystemTimeToVariantTime
InternetQueryDataAvailable
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetOpenA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ