Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
ef5e4d12d77084ca66d23776c1c410742ceb0bf058c58f88df7d48db99bcb56c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ef5e4d12d77084ca66d23776c1c410742ceb0bf058c58f88df7d48db99bcb56c.exe
Resource
win10v2004-20230824-en
Target
ef5e4d12d77084ca66d23776c1c410742ceb0bf058c58f88df7d48db99bcb56c
Size
1.1MB
MD5
5512b0b9e07c196a77a711d4d3a5a710
SHA1
b1d14062c78207fd2881fe7ea5f22ab1c59ecd7e
SHA256
ef5e4d12d77084ca66d23776c1c410742ceb0bf058c58f88df7d48db99bcb56c
SHA512
c7f546dc8627c5d54493b9f4fc1aa2006b778dce6cd495f0d781cf7249cfeee6440438c03cc91ea8f871305b0b43ff8172a48cd015fc0192878570ec90de309c
SSDEEP
12288:+3AqAJVFI0GLf491IqaRmwxLTYn2i6tjAD79:+3DAJvI0sqaRmwlTY2i6tMD79
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
ReadFile
OutputDebugStringW
GetSystemTime
SystemTimeToFileTime
LoadLibraryW
GetTempPathW
GetFileType
SetFilePointer
WriteFile
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateFileA
LocalFileTimeToFileTime
LocalFree
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
RaiseException
SetLastError
SetThreadAffinityMask
GetCurrentThread
QueryPerformanceCounter
OpenFileMappingW
Sleep
SetEvent
InterlockedCompareExchange
ExitProcess
GetSystemTimeAsFileTime
CreateEventW
CreateMutexW
VirtualFreeEx
InterlockedDecrement
InterlockedIncrement
DecodePointer
GetFileSizeEx
SetFilePointerEx
FormatMessageW
TlsSetValue
HeapLock
ReleaseMutex
HeapWalk
TlsAlloc
TlsGetValue
TlsFree
HeapUnlock
OpenThread
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetACP
GetStdHandle
GetCommandLineW
GetCommandLineA
FreeLibraryAndExitThread
ExitThread
GetModuleHandleExW
RtlUnwind
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
GetCPInfo
GetStringTypeW
LCMapStringW
EncodePointer
OpenProcess
TerminateProcess
lstrcmpiW
WaitForSingleObject
CreateThread
HeapDestroy
FindClose
FindNextFileW
FindFirstFileW
SetFileAttributesW
GetLastError
CreateDirectoryW
EnterCriticalSection
LeaveCriticalSection
CreateProcessW
InitializeCriticalSection
DeleteCriticalSection
FreeLibrary
LoadLibraryExW
GetProcAddress
GetModuleFileNameW
GetModuleHandleW
GetCurrentProcessId
CloseHandle
DeviceIoControl
CreateFileW
DeleteFileW
WideCharToMultiByte
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
WriteConsoleW
SetWindowPos
GetParent
GetWindowThreadProcessId
PostMessageW
GetMessageW
DefWindowProcW
DestroyWindow
IsWindow
UnregisterClassW
GetWindowLongW
CallWindowProcW
RegisterWindowMessageW
SendMessageW
PostQuitMessage
RegisterClassExW
FindWindowW
GetClassInfoExW
LoadCursorW
CreateWindowExW
GetKeyState
SetFocus
SetParent
KillTimer
SetTimer
CharNextW
PeekMessageW
TranslateMessage
DispatchMessageW
ShowWindow
SetWindowLongW
RegQueryValueExW
RegQueryValueExA
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegOpenKeyExW
SHFileOperationW
CommandLineToArgvW
SHGetFolderPathW
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
VarUI4FromStr
SysFreeString
SysAllocStringLen
SysAllocString
PathIsRootW
PathRemoveFileSpecW
PathAddBackslashW
PathIsDirectoryW
PathFileExistsW
SHGetValueW
PathAppendW
PathFindFileNameW
SHDeleteKeyW
PathCombineW
SHSetValueW
StrStrIA
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
GetProcessImageFileNameW
??0ShellResourceRequestDetails@@QAE@XZ
??1ShellResourceRequestDetails@@QAE@XZ
??4ShellResourceRequestDetails@@QAEAAU0@ABU0@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE