Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
wd230Session.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
wd230Session.exe
Resource
win10v2004-20230220-en
Target
wd230Session.exe
Size
714KB
MD5
a65a9dc3b094542f24447d0488e0204a
SHA1
daaf7e7e677c309d378d899581b7543b9fb073fd
SHA256
a9b55aac967c10b9b343135ac22985aac577002d93aa83d8a917b9f465792d2a
SHA512
755c264b04c1d1a034041d58460838104ba2b26406523ed3bb12223376dc750936e563db222e2d51c7be7317d9357152f56f11b32e8e820e66cb21264f08592b
SSDEEP
12288:BvlpjpdoUp4vFXMEsElRqfDJVZfVhnT3sahdO2wf0RMbj4kVVT01DYtw8M6XJ10M:tTj75+GEsElR2DfFyWuj4EVTS8M6XJ1r
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InterlockedDecrement
InterlockedExchangeAdd
GetEnvironmentVariableW
InterlockedIncrement
SetEvent
GetCurrentProcessId
WideCharToMultiByte
GetLastError
SetEnvironmentVariableW
HeapCompact
GetProcessHeap
GetCurrentProcess
Sleep
LoadLibraryW
VirtualQuery
GetProcAddress
GetCurrentThreadId
GetTickCount
MultiByteToWideChar
HeapFree
HeapAlloc
HeapReAlloc
InterlockedExchange
DeleteCriticalSection
ProcessIdToSessionId
GetEnvironmentVariableA
CloseHandle
OpenProcess
CreateProcessW
SetLastError
GetModuleHandleW
LoadLibraryExA
LoadLibraryExW
SetCurrentDirectoryW
WaitForSingleObject
GetProcessId
GetCommandLineW
SetEnvironmentVariableA
VirtualProtect
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
IsDebuggerPresent
CreateEventW
OpenEventW
ReleaseMutex
GetComputerNameExW
GetPrivateProfileStringW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
GetSystemTime
InterlockedCompareExchange
InterlockedCompareExchange64
TerminateProcess
LCMapStringW
GetExitCodeProcess
DebugActiveProcess
FreeLibrary
SetThreadPriority
GetCurrentThread
FormatMessageW
LocalFree
HeapCreate
HeapDestroy
FindResourceW
LoadResource
LockResource
GetLocalTime
GetFileInformationByHandle
GetLogicalDriveStringsW
GetVolumeInformationW
WriteFile
ReadFile
SetFilePointer
LockFile
LockFileEx
UnlockFile
UnlockFileEx
FlushFileBuffers
SetEndOfFile
SetFileValidData
SetErrorMode
SystemTimeToFileTime
FileTimeToSystemTime
CreateFileW
DeleteFileW
GetFileAttributesW
CreateDirectoryW
RemoveDirectoryW
FindFirstFileW
FindClose
SetFileAttributesW
FindFirstFileExW
FindNextFileW
GetTempPathW
GetCurrentDirectoryW
GetTempFileNameW
GetFullPathNameW
GetDriveTypeW
FileTimeToLocalFileTime
IsBadReadPtr
GetModuleFileNameW
GetModuleFileNameA
GetVersionExW
GetSystemInfo
GetOverlappedResult
DisconnectNamedPipe
PeekNamedPipe
ConnectNamedPipe
CreateNamedPipeW
CompareStringW
GetTimeZoneInformation
CreateSemaphoreW
ReleaseSemaphore
CreateMutexW
OpenMutexW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetFileType
SystemTimeToTzSpecificLocalTime
CreateThread
ExitThread
ResumeThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
GetACP
GetStringTypeW
GetDateFormatW
GetTimeFormatW
GetConsoleCP
GetConsoleMode
SetStdHandle
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
WriteConsoleW
HeapSize
DecodePointer
ReadConsoleW
CommandeComposante
Execution
_PCS001
bInitWLConvFromVM
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ