Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
5ffc0c9b0456b562e7174cf690fc19b91a06c145b5e7704991cf77d670234f92.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5ffc0c9b0456b562e7174cf690fc19b91a06c145b5e7704991cf77d670234f92.exe
Resource
win10v2004-20220812-en
Target
5ffc0c9b0456b562e7174cf690fc19b91a06c145b5e7704991cf77d670234f92
Size
126KB
MD5
6e6f47684faed02a020af0f2e1c3abed
SHA1
48582d76ea9291f7d24381aeebeed91498dde33b
SHA256
5ffc0c9b0456b562e7174cf690fc19b91a06c145b5e7704991cf77d670234f92
SHA512
129bdd2693881688da3f0ebb754f50cd6342ea5e9efde0c5671a6a14ebc3f3d5a061dcf0081327bf82db91b56f96b085aa93ad01de3793ef3c2cddbcb3f1d830
SSDEEP
3072:5OO7pIdOe4tWpeLGSLNho4b8byAGdJVu/gjkWrzE5nab:k1dOTpGSLX8ehPVZjkWvEpq
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IsValidCodePage
GetLongPathNameW
ReadDirectoryChangesW
EnumTimeFormatsA
ExitProcess
CreateSemaphoreW
SetThreadPriority
FatalAppExitW
GetProcessHeaps
lstrcmpiA
GetCurrentProcess
ConnectNamedPipe
RaiseException
GetDateFormatA
GetCalendarInfoA
VirtualAlloc
lstrcpy
OpenEventA
Sleep
DuplicateHandle
FileTimeToLocalFileTime
LoadLibraryA
EndUpdateResourceW
GetTempFileNameA
GetLongPathNameA
SetComputerNameA
GetSystemDefaultLCID
lstrcpyA
GetLocalTime
GetWindowsDirectoryA
ReplaceFileA
GetTempPathW
CopyFileExW
SetCurrentDirectoryA
GetLocaleInfoA
GetStringTypeA
ExpandEnvironmentStringsW
FindResourceW
lstrcatW
GlobalGetAtomNameA
GetModuleHandleA
EnumDateFormatsA
lstrcmpi
GetCurrentDirectoryA
SetCalendarInfoA
SetEvent
FindAtomA
CreateNamedPipeW
FreeResource
ReplaceFileW
OpenProcess
GetNamedPipeInfo
AddAtomA
GetTempFileNameW
GetThreadLocale
CompareStringA
ArrangeIconicWindows
RegisterWindowMessageW
SetDlgItemTextA
CreateDialogParamA
AppendMenuW
RegisterClassExA
EnumDesktopsW
GetDlgItemInt
GetScrollPos
GetWindowTextW
UpdateWindow
SetTimer
LoadImageA
GetActiveWindow
GetDC
EndDialog
IsDlgButtonChecked
FindWindowW
CharUpperW
DeleteMenu
DestroyWindow
EnableMenuItem
ShowCursor
wvsprintfA
CheckRadioButton
StretchDIBits
EnumICMProfilesA
RemoveFontResourceExA
GetCurrentPositionEx
GetTextCharacterExtra
DeleteEnhMetaFile
GetArcDirection
CreateBitmapIndirect
SetPixelV
GetMultipleTrusteeW
RegRestoreKeyW
RegQueryMultipleValuesA
RegCreateKeyA
SafeArrayCreateVector
SafeArrayGetElemsize
VarR4FromI2
VarUI8FromR8
OleLoadPictureFileEx
SetupDiGetHwProfileList
SetupQueryInfVersionInformationA
CM_Add_ID_ExA
SetupCopyOEMInfW
SetupGetFileQueueCount
SetupDiLoadClassIcon
CM_Open_Class_KeyA
MyRealloc
SetupDiClassNameFromGuidA
CM_Free_Log_Conf_Handle
getpeername
getprotobynumber
accept
inet_addr
closesocket
bind
recvfrom
WSAAccept
EssSecurityLabelDecodeEx
MimeOleSetBodyPropW
EssMLHistoryDecodeEx
MimeOleGenerateFileName
MimeOleGetFileExtension
EssKeyExchPreferenceDecodeEx
EssReceiptDecodeEx
EssReceiptRequestEncodeEx
CreateIMAPTransport
EssKeyExchPreferenceEncodeEx
MimeOleGenerateCID
MimeOleObjectFromMoniker
MimeOleGetContentTypeExt
MimeOleGetPropA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ