Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
ae409c847b6d378d4775d5f65346bf3f6e6e3530b02c3bff7b8d96d38cefd8ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ae409c847b6d378d4775d5f65346bf3f6e6e3530b02c3bff7b8d96d38cefd8ef.exe
Resource
win10v2004-20220812-en
Target
ae409c847b6d378d4775d5f65346bf3f6e6e3530b02c3bff7b8d96d38cefd8ef
Size
163KB
MD5
e971925d8cb2d6051eabd0f56facf3b2
SHA1
ed672f1c8c45b40593ebbd0f2e54f87e8b417e8a
SHA256
ae409c847b6d378d4775d5f65346bf3f6e6e3530b02c3bff7b8d96d38cefd8ef
SHA512
791df91027754f43ca1c3546f15ff0cfde69faa49afe2c6c148a6272d533b1d20951960bc9c1e63cb9b41ffe1b0879f0598156a0ae1a57fd51d25dc17724833b
SSDEEP
3072:70G5qKdK0cZCzIGsrK/ML3jbTsVDzI0gA/iOKRFmQgTy/pPrYLF9F:70vtZzrGML3XTYHgOKRF8Ty/pTW9F
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_XcptFilter
_wcsicmp
atoi
wcsstr
_onexit
_exit
swprintf
_controlfp
_cexit
__setusermatherr
rand
wcscat
wcslen
atol
__getmainargs
exit
_initterm
__initenv
wcstoul
time
wcscmp
sprintf
srand
wcschr
__dllonexit
free
_c_exit
_purecall
malloc
__set_app_type
wcscpy
RegisterServiceCtrlHandlerW
SetServiceStatus
StartServiceCtrlDispatcherW
CreateMutexA
ReleaseSemaphore
SetConsoleNumberOfCommandsA
CreateMutexW
ConvertDefaultLocale
RegisterWaitForSingleObject
GetSystemTimeAsFileTime
CreateSemaphoreW
_lwrite
SetMailslotInfo
WriteConsoleOutputCharacterW
ReadConsoleOutputA
DebugBreak
ResetEvent
GetTickCount
OpenFileMappingA
SetHandleContext
GetPrivateProfileSectionA
GetCurrentProcessId
LZDone
NlsGetCacheUpdateCount
IsDBCSLeadByteEx
GetProcessHeap
InterlockedDecrement
AddVectoredExceptionHandler
GetDefaultCommConfigA
SetConsoleCP
UnhandledExceptionFilter
ReadFile
FindVolumeMountPointClose
GetVolumePathNameA
GetFileSizeEx
GlobalMemoryStatus
GetExitCodeThread
OpenFileMappingW
CompareStringA
SetUnhandledExceptionFilter
lstrcmpiW
CancelDeviceWakeupRequest
MapViewOfFile
GetSystemDefaultUILanguage
FillConsoleOutputCharacterW
GetCompressedFileSizeA
Heap32First
Process32FirstW
WritePrivateProfileStructW
LeaveCriticalSection
GetFullPathNameA
HeapUnlock
CloseHandle
ChangeTimerQueueTimer
GetProfileIntW
EnumResourceNamesW
QueryPerformanceCounter
IsBadStringPtrW
GlobalFree
GetDevicePowerState
CopyFileExA
InterlockedFlushSList
VirtualAlloc
GetLastError
EnterCriticalSection
ReplaceFileW
GetCurrentProcess
Module32Next
ExitProcess
DeleteFileW
TerminateProcess
GetComputerNameW
DeleteCriticalSection
RaiseException
WaitForSingleObject
GetConsoleAliasExesLengthA
CreateMailslotW
GetTimeFormatA
FindFirstVolumeMountPointA
_hwrite
OpenWaitableTimerA
InterlockedIncrement
OpenProcess
RtlFillMemory
DebugActiveProcessStop
MapUserPhysicalPagesScatter
QueryActCtxW
BeginUpdateResourceW
CreateFileW
RpcImpersonateClient
RpcRevertToSelf
UuidIsNil
RpcStringFreeW
NdrClientCall2
RpcMgmtSetCancelTimeout
RpcMgmtWaitServerListen
RpcServerListen
RpcServerUseProtseqEpW
RpcStringBindingComposeW
RpcRaiseException
RpcMgmtStopServerListening
RpcServerRegisterIf
RpcStringBindingParseW
RpcBindingFromStringBindingW
UuidFromStringW
NdrServerCall2
RpcBindingFree
UuidToStringW
NetRegisterDomainNameChangeNotification
DsRoleGetPrimaryDomainInformation
NetGetDCName
DsRoleFreeMemory
DsGetDcNameW
NetApiBufferFree
NetServerEnum
ord13
ord15
ADSIGetNextRow
ADSISetObjectAttributes
ADSIFreeColumn
ADSIDeleteDSObject
ADSICloseSearchHandle
ADSISetSearchPreference
ADSICreateDSObject
ADSICloseDSObject
ADSIGetColumn
ADSIExecuteSearch
ADSIGetFirstRow
ADSIOpenDSObject
ADSIGetObjectAttributes
wsprintfW
GetMMPolicy
CloseTransportFilterHandle
DeleteMMAuthMethods
MatchMMFilter
StrRChrIW
SHBrowseForFolderA
SHGetFileInfo
StrNCmpIW
ExtractIconExW
StrStrW
SHSetUnreadMailCountW
SHOpenFolderAndSelectItems
PrintersGetCommand_RunDLLA
SHHelpShortcuts_RunDLLW
ExtractIconA
Control_RunDLLW
OpenAs_RunDLLW
SHGetIconOverlayIndexA
SHGetSpecialFolderPathW
DllGetClassObject
ShellExecuteExA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ