Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
39b88cbbd40cadc7d8a289cc6b74ce819685e83b7612b1211996efb2a0ffe573.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39b88cbbd40cadc7d8a289cc6b74ce819685e83b7612b1211996efb2a0ffe573.exe
Resource
win10v2004-20220901-en
Target
39b88cbbd40cadc7d8a289cc6b74ce819685e83b7612b1211996efb2a0ffe573
Size
2.7MB
MD5
63e43fb4ecac4541ec9364fb64c5e4b4
SHA1
d00a0b7a961ce5face3c53728f670231d4ac7ede
SHA256
39b88cbbd40cadc7d8a289cc6b74ce819685e83b7612b1211996efb2a0ffe573
SHA512
6bfa47f13bc83ef93d30e1ac51c11121a6bf5e81529279b2df166ead5cf233cf82e3cba9336b5b5de7e66e4ee9a72482851080f3f34e0ee6b13ad1d037763060
SSDEEP
49152:9JnjwfiwY16wzZiIxyWDr/Nz5bTChxKCnFnQXBbrtgb/iQvu0UHOaz:LnjwkwwzZdDzNz56hxvWbrtUTrUHOk
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetModuleFileNameW
DuplicateHandle
GetCurrentProcess
SetFileTime
CopyFileW
GetDriveTypeW
GetFileTime
CreateFileW
SetErrorMode
GetTempFileNameW
GetTempPathW
ExitProcess
Sleep
DeleteFileW
CloseHandle
WaitForSingleObject
CreateProcessW
ReadProcessMemory
GetThreadSelectorEntry
GetThreadContext
GetLastError
lstrlenW
GetModuleHandleW
GetStartupInfoW
MessageBoxA
ShellExecuteW
memset
wcscpy
free
_fileno
_chsize
wcsrchr
wcscat
malloc
fclose
fread
fwrite
fseek
_wfopen
sprintf
fflush
_exit
_XcptFilter
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ