Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
11033fe49e144984b82ae16ce1221cd0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
11033fe49e144984b82ae16ce1221cd0.exe
Resource
win10v2004-20220901-en
Target
11033fe49e144984b82ae16ce1221cd0
Size
373KB
MD5
11033fe49e144984b82ae16ce1221cd0
SHA1
5cafb0702e89b7a0982e33e8a5c5d52d0e17a1c2
SHA256
1fb9cb60b11165df3298dee55b59517e3ed15957b820b19b4ca0d8f9f2e20173
SHA512
7eda789c95f11dea47189a6240fc791450fdf2496d26062824eb1d55581bbe8ed887a16c4e274f1ef86b8de27a582d39074e22f98129606f8e1a0300480a0bca
SSDEEP
6144:4vDfx5VSvd4vsG5eAFtU2K+Z+E1FgOMgEChTBqOhdKr0Y1445vbrr6zAHFf:4vDJ5VSviLtUDE/QChTsOYM4dr+zAx
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VerQueryValueA
LockResource
LoadResource
FindResourceA
GetModuleHandleA
DeleteFileA
Sleep
CloseHandle
GetTickCount
WaitForMultipleObjects
FreeLibrary
GetProcAddress
LoadLibraryA
GetTempFileNameA
GetTempPathA
CreateEventA
OpenProcess
SizeofResource
GetModuleFileNameA
GetCurrentProcess
InitializeSListHead
Process32Next
Process32First
CreateToolhelp32Snapshot
Thread32Next
Thread32First
InterlockedPopEntrySList
WaitForSingleObject
InterlockedIncrement
InterlockedDecrement
InterlockedPushEntrySList
HeapFree
GetProcessHeap
CompareStringW
CompareStringA
FormatMessageA
lstrlenA
LocalAlloc
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
GetVersionExA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
LocalFree
GetCurrentThreadId
SetUnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
UnmapViewOfFile
GetComputerNameA
MapViewOfFile
CreateFileMappingA
WriteFile
SetFilePointer
CreateFileA
GetLocalTime
GetSystemTimeAsFileTime
SetEvent
ResetEvent
ReleaseMutex
ReleaseSemaphore
CreateMutexA
CreateSemaphoreA
GetThreadLocale
QueryPerformanceFrequency
QueryPerformanceCounter
GetDateFormatA
GetTimeFormatA
HeapAlloc
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapReAlloc
VirtualAlloc
VirtualQuery
GetCommandLineA
GetStartupInfoA
ExitThread
CreateThread
LCMapStringA
LCMapStringW
GetCPInfo
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTimeZoneInformation
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetLocaleInfoW
CreateFileW
SetEndOfFile
SetEnvironmentVariableA
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
RegOpenKeyExA
RegSetValueExA
SetSecurityInfo
InitializeAcl
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
RegCloseKey
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoCreateInstance
SysFreeString
VariantInit
VariantClear
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ