Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
0a951e8ebc503018d9e5bac26b2a1566.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a951e8ebc503018d9e5bac26b2a1566.exe
Resource
win10v2004-20231215-en
Target
0a951e8ebc503018d9e5bac26b2a1566
Size
1.9MB
MD5
0a951e8ebc503018d9e5bac26b2a1566
SHA1
a106924f6a3399542a9ca57774d0627660d281b6
SHA256
73879e571fc1f237311f7e1f85e95fbe3b1b6cf9646b3df42c5d4d9f05936960
SHA512
1dbcedd11606f421e7cd4d9b7f8b8cf18a1d41886ec1629ffee3bbb017327ee5ba6d15cd9d8f8c014a5abc1b06210785dcb49a3726a097fd45d3f2526c738fe7
SSDEEP
49152:VeC31OA12zRoPrkJ/WB64y7hzY7ikheuyPviCt3/M:VplOU2NvOBZy7hEukhgPvi63E
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetShortPathNameW
GetLongPathNameW
GetSystemDirectoryW
MapViewOfFile
CreateFileMappingW
OpenFileMappingW
DeleteFileW
CreateDirectoryW
GetTempPathW
FreeLibrary
LoadLibraryW
RemoveDirectoryW
DeleteCriticalSection
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
UnmapViewOfFile
InitializeCriticalSection
CreateMutexW
GetLastError
GetWindowsDirectoryW
FindFirstFileW
lstrcpynW
FindClose
WideCharToMultiByte
GetCommandLineW
lstrlenA
SetLastError
lstrlenW
ReadProcessMemory
LoadLibraryExW
GetModuleFileNameW
lstrcmpW
lstrcpynA
ExpandEnvironmentStringsA
GetVersionExW
ReleaseMutex
GetCurrentThreadId
WaitForSingleObject
InterlockedIncrement
DebugBreak
OutputDebugStringW
DeviceIoControl
CreateFileW
HeapFree
HeapAlloc
GetProcessHeap
LocalFree
SizeofResource
MultiByteToWideChar
LoadResource
FindResourceW
WriteFile
IsBadStringPtrW
MoveFileExW
GetShortPathNameA
GetWindowsDirectoryA
RtlUnwind
EncodePointer
DecodePointer
RaiseException
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetLocalTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
Sleep
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetFileAttributesW
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointer
LCMapStringW
SetStdHandle
FlushFileBuffers
CreateFileA
WriteConsoleW
SetEndOfFile
GetVersion
GetSystemInfo
GetCurrentProcessId
Module32FirstW
Module32NextW
CloseHandle
GetModuleHandleW
GetModuleHandleA
FlushInstructionCache
lstrcmpiA
GetCurrentProcess
LockResource
GetProcAddress
RegOpenKeyExW
RegSetValueExW
RegQueryValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyW
RegEnumKeyExW
RegCloseKey
CoTaskMemFree
CLSIDFromString
StringFromCLSID
SysFreeString
SysAllocString
PathFileExistsW
PathAppendA
PathRemoveFileSpecW
StrCmpIW
StrStrIW
PathFindFileNameW
SHGetValueW
PathAppendW
wvsprintfW
LoadStringW
CharUpperW
CharNextW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ