Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
41fc6ba8d1337d4e52b42ffcdfc719e038aa343984130ac58a9df574cf8ff62a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
41fc6ba8d1337d4e52b42ffcdfc719e038aa343984130ac58a9df574cf8ff62a.exe
Resource
win10v2004-20220812-en
Target
41fc6ba8d1337d4e52b42ffcdfc719e038aa343984130ac58a9df574cf8ff62a
Size
845KB
MD5
9437cc7e1d97526c03f2e86075efb4bb
SHA1
969bdbbe4260fbaa9a51ae0ccdec1a0c1263fc9a
SHA256
41fc6ba8d1337d4e52b42ffcdfc719e038aa343984130ac58a9df574cf8ff62a
SHA512
687cbf939491093ddf018dca63a22d072cafec0abc6cf7258094a33ae9929e057550d69113201677c7a6bb8f61cec6faa4daae2071800c0a6d7c9c13fbdadaea
SSDEEP
12288:1X9hg0n33jE3UOjoCzsy0Y7Noz8TQxG7nbgw/UG5yf4tUh04GUJBUJScXlNUX9:1n0zt0Y7fQxG7n0w/Uqt5kJBUFlNc
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindFirstFileW
FindNextFileW
FindClose
CopyFileW
CreateThread
InitializeCriticalSection
EnterCriticalSection
GetLocalTime
LeaveCriticalSection
GetLogicalDriveStringsW
QueryDosDeviceW
GetFullPathNameW
GetLongPathNameW
RemoveDirectoryW
CreateMutexW
ReleaseMutex
LoadLibraryW
GetProcAddress
GetCurrentProcess
GetVersionExW
GetSystemDirectoryW
GetVolumePathNameW
GetVolumeInformationW
ReplaceFileW
GetFileTime
GetSystemTimeAsFileTime
CreateDirectoryW
GetFileAttributesW
GetModuleHandleW
GetTickCount
SetProcessShutdownParameters
FormatMessageA
TerminateProcess
Sleep
Process32NextW
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
WriteFile
ReadFile
GetFileSize
CreateFileW
GetTempPathW
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
GetCommandLineW
CloseHandle
CreateProcessW
LocalFree
GetLastError
WaitForSingleObject
ExitProcess
GetCurrentProcessId
GetEnvironmentVariableW
GetModuleFileNameW
GetFileInformationByHandle
GetProcessHeap
SetEndOfFile
CreateFileA
WriteConsoleW
SetEnvironmentVariableA
CompareStringW
IsValidLocale
EnumSystemLocalesA
DeleteFileW
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
SetFilePointer
SetStdHandle
GetComputerNameW
GetCurrentThreadId
GetModuleHandleA
GetVersion
GetFileType
GetStdHandle
QueryPerformanceCounter
GlobalMemoryStatus
FreeLibrary
LoadLibraryA
GetVersionExA
FlushConsoleInputBuffer
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EncodePointer
DecodePointer
DeleteCriticalSection
HeapFree
HeapAlloc
HeapSetInformation
GetStartupInfoW
SetConsoleCtrlHandler
HeapReAlloc
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
IsProcessorFeaturePresent
HeapSize
InitializeCriticalSectionAndSpinCount
SetHandleCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetLocaleInfoW
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
FlushFileBuffers
DispatchMessageW
GetMessageW
SetTimer
CharLowerW
GetUserObjectInformationW
GetProcessWindowStation
GetDesktopWindow
GetSystemMetrics
CreateWindowExW
RegisterClassExW
DefWindowProcW
MessageBoxA
CreateDesktopW
RegisterEventSourceA
DeregisterEventSource
ConvertSidToStringSidW
LookupAccountNameW
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ReportEventA
ShellExecuteW
SHGetFolderPathW
CommandLineToArgvW
CoCreateGuid
GetProcessImageFileNameW
AssocQueryStringW
InternetCloseHandle
InternetSetOptionW
HttpQueryInfoA
InternetOpenW
InternetOpenUrlW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ