Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
ac0502fee703a6671b2ae3d56fa0732b5e583fa03231bd489e7198b50e7b0ed7.exe
Resource
win7-20220812-en
Target
ac0502fee703a6671b2ae3d56fa0732b5e583fa03231bd489e7198b50e7b0ed7
Size
479KB
MD5
2bd2dc6c6fba954b26d0263cb6394743
SHA1
ead4bb3224394c52fbd4c8779fa049cead99be10
SHA256
ac0502fee703a6671b2ae3d56fa0732b5e583fa03231bd489e7198b50e7b0ed7
SHA512
1cf8d01e739670360bc86274f79e6f1c7dd7334d94ae04ca2f8d19f39b2056c4d7bb091f3d520e5d118c5125bc3ac788bd922a751a5ca5a63332d703519eacb7
SSDEEP
12288:nHO++IUBvCkfmvz756FGtkeSUknzp7tRuvftbObG:HxzUV5a75G0OtXggbG
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WSAStartup
socket
htonl
gethostbyname
htons
connect
send
recv
closesocket
WSACleanup
MapViewOfFile
GetLastError
OpenFileMappingW
CreateThread
WaitForSingleObject
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcatW
GetModuleHandleW
DeleteFileW
EnumResourceNamesW
LocalFree
lstrlenW
GetModuleFileNameW
GetCurrentProcessId
SetCurrentDirectoryW
UnmapViewOfFile
ExitProcess
TerminateThread
FindResourceW
SizeofResource
WriteFile
CreateFileW
LockResource
LoadResource
GlobalFree
GlobalAlloc
GetVersionExW
SetEvent
GetCurrentDirectoryW
CreateEventW
GetExitCodeProcess
GetProcessId
CloseHandle
CreateDirectoryW
GetFileAttributesW
RemoveDirectoryW
FindNextFileW
FindClose
FindFirstFileW
GetLongPathNameW
GetTempFileNameW
GetTempPathW
ReadFile
SetFilePointer
GetCommandLineW
GetCurrentProcess
CreateWindowExW
RegisterClassW
PostMessageW
LoadStringW
MoveWindow
SetLayeredWindowAttributes
GetSystemMetrics
SetForegroundWindow
SetWindowPos
GetWindowThreadProcessId
EnumWindows
TranslateMessage
DispatchMessageW
GetMessageW
DestroyWindow
UnregisterClassW
DefWindowProcW
RegCreateKeyW
RegCloseKey
RegDeleteKeyW
RegOpenKeyExW
GetTokenInformation
OpenProcessToken
DuplicateTokenEx
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
RegQueryValueExW
CreateProcessAsUserW
CommandLineToArgvW
SHFileOperationW
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ