Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
PO202501F.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO202501F.exe
Resource
win10v2004-20241007-en
Target
PO202501F(3).zip
Size
220KB
MD5
8d34e1266ad70c2f270e3839abf99b33
SHA1
7142001f402874338059eb3b0f615c720cda0095
SHA256
85432f9c3c0e7b2cf536001fee537ac2288743a8b98da66f9d2096a13c30c80d
SHA512
ff7061b5ce09ac2bf71de8f405f7bf855b40a4c7fc17ac9f4718e5da735e8d10569a2b96d2d03fcf0a7a3c056e6b8e0c02dfa4e72f99d5fc97bd9d83a4073c7b
SSDEEP
6144:+k1ihymwPCY0rFeJWlcCO080pBdwh1/uTL:+AiQ45eJWlcCb8ES/U
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WTSFreeMemory
WTSEnumerateSessionsA
ShellExecuteA
SHGetFolderPathA
InternetOpenA
InternetCloseHandle
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
CreateDirectoryA
CloseHandle
GetLastError
InitializeCriticalSectionEx
DeleteCriticalSection
Sleep
TerminateProcess
CreateProcessA
GetSystemDirectoryW
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
CopyFileA
FreeConsole
K32EnumProcesses
IsDebuggerPresent
OutputDebugStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
GetStringTypeW
SetStdHandle
CreateFileW
WriteConsoleW
GetWindowsDirectoryA
RtlPcToFileHeader
GetFileType
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapFree
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
VirtualProtect
CompareStringW
LCMapStringW
HeapSize
HeapReAlloc
HeapAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
RegCreateKeyExA
RegCloseKey
RegSetValueExA
CoInitializeEx
CoUninitialize
CreateStreamOnHGlobal
NtResumeThread
NtSetContextThread
NtAllocateVirtualMemory
NtFreeVirtualMemory
NtGetContextThread
NtWriteVirtualMemory
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ