Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
PO202501F.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO202501F.exe
Resource
win10v2004-20241007-en
Target
PO202501F.exe
Size
718KB
MD5
4e4fb45c99a574849a086232116f8bfc
SHA1
ee52062d05ff64cb7fc57bc647535929cbe856d9
SHA256
b541d2f2c3ea6e6f3cb26bba9bf36a0034a01cbb225e794c94ff957d09991e77
SHA512
2ec98860cba067f2a60fe0e9819b390bbec6536ddbf2b06a5a9a65b8a450dba013a763b00f2a850444d92532233ec5c2c825163ea38755830c9303fea3350ef7
SSDEEP
12288:Aoe7DH/meETdAAHOPaLsegLyjR0SxJxycahXjIC72:g7DQAC0aLoL8RNrycahTt72
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
ord13
ord144
InternetCheckConnectionA
DWriteCreateFactory
PathCchCombine
PdhCloseQuery
PdhOpenQueryA
NCryptFreeObject
NCryptOpenStorageProvider
GetStringTypeW
SetStdHandle
GetFileType
GetProcessHeap
SetEnvironmentVariableW
GetEnvironmentVariableA
ExpandEnvironmentStringsA
CreateDirectoryA
CreateFileW
GetLogicalDrives
CloseHandle
GetLastError
InitializeCriticalSectionEx
GetConsoleMode
Sleep
FlushFileBuffers
CreateProcessA
FreeLibrary
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
LoadLibraryA
LocalFree
CopyFileA
FreeConsole
IsDebuggerPresent
OutputDebugStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsW
TerminateProcess
GetConsoleOutputCP
SetFilePointerEx
WriteConsoleW
DeleteCriticalSection
RtlVirtualUnwind
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapAlloc
HeapReAlloc
HeapSize
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
RtlCaptureContext
RtlLookupFunctionEntry
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
RtlUnwindEx
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapFree
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
VirtualProtect
CompareStringW
LCMapStringW
OpenTraceA
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
SetEntriesInAclA
CoCreateInstance
CoInitializeEx
CoUninitialize
ShellExecuteW
SHGetFolderPathA
ord141
Direct3DCreate9
WSACleanup
WSAStartup
socket
closesocket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ