Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
157d376175189de851094afff36dabdd003151235777c45beb4c4ae43a426244N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
157d376175189de851094afff36dabdd003151235777c45beb4c4ae43a426244N.exe
Resource
win10v2004-20241007-en
Target
157d376175189de851094afff36dabdd003151235777c45beb4c4ae43a426244N.exe
Size
311KB
MD5
aac9cb46fdc770154b4f2a71e6af2bd0
SHA1
50dd0a9e31c2f3e27f36dee5d4904a23776ec3d2
SHA256
157d376175189de851094afff36dabdd003151235777c45beb4c4ae43a426244
SHA512
a8295be1ed98d063968fe5c26ab333b35b2c5c8e9528dc88b63faa7e749933f6b2648876be1d15e7fa2d501726a29052b4fcc771a0134597f8d5b53c17ee1587
SSDEEP
6144:WD10T8d6hY1faZLUHow4CFTPk2rrXVmtiHh7oe+A7S:K0T8d6hYV2sTTPjpmrA7S
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\work\__chrome_ex_install\__my_src\src\x64\Release\xagent.pdb
VirtualAllocEx
CreateProcessW
CreateRemoteThread
VirtualFreeEx
GetFileSizeEx
FindNextFileW
TerminateProcess
GetModuleFileNameW
FindClose
CreateFileW
GetProcAddress
GetExitCodeProcess
WriteConsoleW
SetEndOfFile
HeapSize
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
CloseHandle
Process32FirstW
Process32NextW
GetLastError
MultiByteToWideChar
CreateToolhelp32Snapshot
OpenProcess
GetACP
IsValidCodePage
GetModuleHandleA
WaitForSingleObject
WriteProcessMemory
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
DuplicateHandle
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetFileType
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetFileAttributesExW
CreatePipe
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadFile
GetTimeZoneInformation
ReadConsoleW
HeapReAlloc
FindFirstFileExW
RtlUnwind
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ