Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
Testlimit64.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Testlimit64.exe
Resource
win10v2004-20231023-en
Target
Testlimit64.exe
Size
238KB
MD5
110197e4076bcd7cdc97066f73566ec0
SHA1
14412a4188c4ff8db5efa03b4ce5cc4c55c8cf39
SHA256
f1564b3c3eee87d62ef04ccf2c6b453020d3547faa2ccc5c9e2cef94fe659f2f
SHA512
c86ff179c084a9bea03e355310afddd3d3d38f5e0fbda1c84f95b11f491d8c5388647293ae35392c0bca62e61d745021f1bf5673caaea811495942f24b16daf9
SSDEEP
3072:jj8HiODN40wSWZkglMYoY8MZT64N9/1A0BPDIRObj5UFYZFvgGZriIipNV+GPyMA:n8HiOVwxpoY1TP9/aK6VYHl4khIs
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
VirtualAlloc
GetLargePageMinimum
VirtualLock
AllocateUserPhysicalPages
GetModuleFileNameA
GetProcessWorkingSetSize
SetProcessWorkingSetSize
FormatMessageA
CreateFileMappingA
GetTickCount
SetStdHandle
WriteConsoleW
SetFilePointerEx
HeapReAlloc
HeapSize
OutputDebugStringW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetSystemInfo
CreateProcessA
CreateThread
GetCurrentProcessId
GetCurrentProcess
Sleep
GetLastError
CreateEventA
CloseHandle
DuplicateHandle
WriteFile
CreateFileA
LoadLibraryA
LocalFree
LocalAlloc
GetProcAddress
GetModuleHandleA
GetFileType
GetCommandLineW
ReadFile
GetStdHandle
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
GetConsoleMode
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ReadConsoleInputA
SetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThread
GetCurrentThreadId
DeleteCriticalSection
FatalAppExitA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
GetModuleFileNameW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
RtlUnwindEx
GetProcessHeap
CreateFileW
FlushFileBuffers
GetConsoleCP
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
ReadConsoleW
CreateMenu
RegisterClassA
LoadCursorA
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextA
GetDlgItem
EndDialog
DialogBoxIndirectParamA
SendMessageA
EndPage
StartPage
EndDoc
StartDocA
SetMapMode
GetDeviceCaps
CreateBitmap
PrintDlgA
AdjustTokenPrivileges
OpenProcessToken
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
LookupPrivilegeValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ