Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
WD210awp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
WD210awp.exe
Resource
win10v2004-20230220-en
Target
WD210awp.exe
Size
280KB
MD5
12bc7f371326e2eb4e0d6759e27572bc
SHA1
c0b62381d3248a21ecbf7cff12c914a5b047c534
SHA256
6ac433459de769d1e03874c21bba52e87a6c75e242c8bdc140de80e62f66d25b
SHA512
66503bda9dc04983d9c5901b9484897b4edba0d5bc5eb47d6be8f8f8e7089b526de4b358f85c9a16e5ee0327728b03d7d7cd7753aadb3df2b3837cdd8d3cd0af
SSDEEP
6144:rUOMIDKZUsufkC1vgViLDHVa7pvSf/rYO5f1vYB5:rLKXC1vSi3VAMfd1AB
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
WaitForSingleObject
GetLastError
OpenProcess
GetStdHandle
WriteFile
LoadLibraryExW
FreeLibrary
Sleep
GetModuleFileNameW
SetProcessWorkingSetSize
TerminateProcess
SetLastError
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentVariableW
CreateProcessW
GetEnvironmentVariableA
ReadFile
GetCurrentProcessId
IsDebuggerPresent
OpenEventW
GetTickCount
GetCurrentThreadId
ReleaseMutex
ResetEvent
WaitForMultipleObjects
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
FindResourceW
LoadResource
LockResource
HeapAlloc
GetProcessHeap
WideCharToMultiByte
HeapFree
GetSystemTime
InterlockedCompareExchange
ProcessIdToSessionId
LCMapStringW
GetExitCodeProcess
GetSystemTimeAsFileTime
FormatMessageW
LocalFree
CreatePipe
DuplicateHandle
GetCurrentProcess
GetFileSize
InitializeCriticalSection
DeleteCriticalSection
InterlockedCompareExchange64
LeaveCriticalSection
LoadLibraryW
GetProcAddress
GetFileInformationByHandle
GetLogicalDriveStringsW
GetVolumeInformationW
SetFilePointer
LockFile
LockFileEx
UnlockFile
UnlockFileEx
FlushFileBuffers
SetEndOfFile
SetFileValidData
SetErrorMode
CreateFileW
DeleteFileW
GetFileAttributesW
FindClose
FindFirstFileExW
FindNextFileW
GetFullPathNameW
GetDriveTypeW
MultiByteToWideChar
GetModuleHandleW
PeekNamedPipe
OpenMutexW
GetVersionExW
VirtualQuery
VirtualProtect
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
EnterCriticalSection
InterlockedExchangeAdd
GetSystemInfo
DecodePointer
EncodePointer
WriteConsoleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
GetStartupInfoW
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetFileType
ExitProcess
GetModuleHandleExW
GetACP
HeapReAlloc
GetStringTypeW
SetStdHandle
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
HeapSize
ReadConsoleW
LoadLibraryExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ