Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
43978ab91a5a203091fa5f958df67e7928ee6b9f5573fc840ad975f544919ef9.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
43978ab91a5a203091fa5f958df67e7928ee6b9f5573fc840ad975f544919ef9.exe
Resource
win10v2004-20231023-en
Target
43978ab91a5a203091fa5f958df67e7928ee6b9f5573fc840ad975f544919ef9
Size
604KB
MD5
a1aaccf2ac9b94c50abe206f01a78fed
SHA1
9d5f1b24f871f681a3a92f78ab38124904156a4a
SHA256
43978ab91a5a203091fa5f958df67e7928ee6b9f5573fc840ad975f544919ef9
SHA512
9118cc0789765453b9aafee2a79cb31abae5c28a5bea0a2625ba430c4c89f991137747dd1144104e99c643454362af96f972729e0eeb73b85ef221624a694d9f
SSDEEP
12288:w55QCqbwgc0AD0qQP6GiggggM1Ho/GPPcDDQDfkSehzdduH7zSU6Q93EIu4q1IRe:FMAiggggM1dPPyQww/SU6u3Bm1IRe
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileW
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
FindClose
GetNativeSystemInfo
FindFirstFileW
FindNextFileW
DeleteFileW
GetCurrentProcessId
VirtualQuery
MoveFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateDirectoryW
GetFileSize
WriteFile
ReadFile
GetModuleHandleW
CreateFileA
DeviceIoControl
GetSystemDirectoryA
GlobalFree
VirtualAlloc
VirtualFree
LoadLibraryW
SetLastError
LoadLibraryA
IsBadReadPtr
IsDebuggerPresent
OutputDebugStringW
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetLogicalDriveStringsW
TerminateProcess
GetCurrentProcess
OpenProcess
LocalFree
LocalAlloc
GetProcAddress
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
GetCurrentThreadId
GetCommandLineW
CreateMutexW
CloseHandle
ReleaseMutex
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DecodePointer
GetOEMCP
IsValidCodePage
FindFirstFileExW
WriteConsoleW
ReadConsoleW
SetEndOfFile
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetACP
GetStdHandle
GetModuleHandleExW
ExitProcess
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetFileType
GetTimeZoneInformation
RtlUnwind
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
VirtualProtect
Sleep
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
LoadLibraryExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
TryEnterCriticalSection
GetStringTypeW
QueryPerformanceCounter
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
DefWindowProcW
GetUserNameW
RegSetValueExW
SetEntriesInAclW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
LookupAccountSidW
FreeSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
CoUninitialize
CoInitialize
SHGetFolderPathW
CommandLineToArgvW
PathRemoveFileSpecW
PathFileExistsW
PathCombineW
PathFindFileNameW
EnumProcesses
GetProcessImageFileNameW
ObtainUserAgentString
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpCrackUrl
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpOpen
WinHttpWriteData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ