Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
a16c2ee2abb58f7829c7f950554ce79a161dfa085ed340f0f01510cad3dbb357.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a16c2ee2abb58f7829c7f950554ce79a161dfa085ed340f0f01510cad3dbb357.exe
Resource
win10v2004-20220812-en
Target
a16c2ee2abb58f7829c7f950554ce79a161dfa085ed340f0f01510cad3dbb357
Size
149KB
MD5
30209d809334974f67c13c3af9937641
SHA1
805eb03321549e129d7ca95f43aee3d15a6f4897
SHA256
a16c2ee2abb58f7829c7f950554ce79a161dfa085ed340f0f01510cad3dbb357
SHA512
cf51a45a79bf900ccde35f02b39e5dd386912b9f272a0c050c3a88da68b963fdf746ed77022b9284996aa7db8d70a307f6204a838fdb37a660848c3c3cffd511
SSDEEP
3072:QquYMtS+SpBehfzapRc5nelaVLVLVLVLVzcSLe3Zd0D10z:5uxSiBWpOe3ZLz
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ReadFile
LocalFree
GetStdHandle
GetSystemInfo
IsBadCodePtr
VirtualProtect
DeleteFileA
CreateDirectoryA
GetFileAttributesA
GetFileTime
SetFileTime
GetProcAddress
GetCommandLineA
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetCurrentProcess
GetCurrentThreadId
SetEnvironmentVariableA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
IsBadReadPtr
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetStdHandle
SetEndOfFile
SetHandleCount
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
HeapSize
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
HeapReAlloc
GetStartupInfoA
GetFileType
ExitProcess
RtlUnwind
VirtualAlloc
HeapFree
HeapAlloc
VirtualQuery
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLocalTime
GetTickCount
SetFilePointer
WriteFile
GetModuleFileNameA
SetLastError
WaitForSingleObject
GetExitCodeProcess
FindFirstFileA
FindClose
CompareFileTime
QueryPerformanceCounter
GetCurrentProcessId
CreateProcessA
TerminateProcess
GetModuleHandleA
LoadLibraryA
SetFileAttributesA
CopyFileA
GetDriveTypeA
CreateFileA
GetPrivateProfileStringA
GetSystemTimeAsFileTime
WritePrivateProfileStringA
DeviceIoControl
CreateThread
CloseHandle
CompareStringW
CompareStringA
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetLocaleInfoA
GetACP
InterlockedExchange
EndDialog
SetWindowTextA
SendMessageA
GetDesktopWindow
DialogBoxParamA
LoadIconA
MessageBoxA
GetActiveWindow
SHGetFolderPathA
ShellExecuteExA
VariantClear
PathCombineA
PathIsDirectoryA
PathFileExistsA
SHSetValueA
URLDownloadToFileA
GetUrlCacheEntryInfoA
DeleteUrlCacheEntryA
ord23
ord21
ord22
ord20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ