Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
11ef2d61d964cc83b3c55438f347a5e8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11ef2d61d964cc83b3c55438f347a5e8.exe
Resource
win10v2004-20231215-en
Target
11ef2d61d964cc83b3c55438f347a5e8
Size
692KB
MD5
11ef2d61d964cc83b3c55438f347a5e8
SHA1
38ef61756972fd8c34802dbf62b3664718b2d098
SHA256
1269b565830aad74b9f03f751e9f84503fd5694e3f8da5dcc150d29d16c6ad1a
SHA512
d4ef181118a016a3fcc3c7da326ffedf93a77ce324d400058707f85c6feb60cae2004ac41c197d35a456a5a8c0e34526d1852480d2c2baff24fa237b0535dfe0
SSDEEP
12288:n/LRIZd0N6KSNIN12vzVi+Qi8UpFlTj9TtWx1YKH0iwHw:nD6IN8zVi+bXlH9Tt+H0id
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WriteFile
SetFilePointer
CreateFileW
ReadFile
FindClose
FindFirstFileW
GetDriveTypeW
CreateDirectoryW
GetTickCount
FindNextFileW
DeleteFileA
lstrlenW
WTSGetActiveConsoleSessionId
CreateFileA
WideCharToMultiByte
OutputDebugStringA
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
TerminateProcess
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetModuleFileNameW
GetModuleHandleExW
LocalFree
GetCurrentProcessId
CreateMutexW
MultiByteToWideChar
GetVersionExW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ReleaseMutex
CreateEventW
SetEvent
Sleep
InterlockedIncrement
InterlockedDecrement
HeapCreate
IsProcessorFeaturePresent
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
SetPriorityClass
DeviceIoControl
CloseHandle
GetModuleHandleW
FreeLibrary
GetProcAddress
OutputDebugStringW
GetLastError
LoadLibraryW
GetCurrentThread
GetCurrentProcess
lstrlenA
VirtualQuery
lstrcatA
GetLocalTime
lstrcpyA
SetUnhandledExceptionFilter
SetErrorMode
GetModuleFileNameA
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetEndOfFile
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetLocaleInfoW
IsDebuggerPresent
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
GetStdHandle
GetFileType
HeapSize
GetTimeZoneInformation
FlushFileBuffers
IsValidCodePage
GetOEMCP
GetACP
QueryPerformanceCounter
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
ExitProcess
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
HeapFree
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
WriteConsoleW
PostMessageW
FindWindowW
MessageBoxW
wsprintfW
MessageBoxA
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
OpenProcessToken
GetTokenInformation
LookupAccountSidW
SHGetFolderLocation
ord155
SHGetPathFromIDListW
CoCreateInstance
CoInitializeSecurity
CoInitialize
CoUninitialize
CoTaskMemFree
CoSetProxyBlanket
VariantClear
SysAllocString
SysFreeString
VariantInit
PathFileExistsW
SymInitialize
StackWalk
SymGetModuleBase
SymFunctionTableAccess
SymGetSymFromAddr
SymCleanup
GetModuleFileNameExW
WTSQueryUserToken
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE