Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2a73f42f519710e596c561ff6207682b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2a73f42f519710e596c561ff6207682b.exe
Resource
win10v2004-20231215-en
Target
2a73f42f519710e596c561ff6207682b
Size
4.0MB
MD5
2a73f42f519710e596c561ff6207682b
SHA1
dcfbd0a7179845de44fe9723f93766d474826452
SHA256
6d7821a4006f342ce06d72b0ea732ee1f7a6b29bb4f3aaa0b362949a9c941ec1
SHA512
75839a4c1b53836350fdfdbf5bbbb08a911843a956f089dc4bce24b7c1c3fb82a9aeccab0f4aa5ad30b184eaa06de26ed34e10d22e9922068ec4b99e41eff42d
SSDEEP
98304:43lZcS44lJH2PGb1GFIJ4jfbYGaXIMxaV99cQrRkTlLLp:2ZcS44lJegzJ4jTYGaXBxic/
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WSAStartup
UuidToStringW
RpcStringFreeW
SHDeleteValueW
PathFindFileNameW
PathRemoveExtensionW
SHSetValueW
SHDeleteKeyW
SHGetValueW
SetWindowLongW
CreateWindowExW
GetSystemMetrics
LoadIconW
PostQuitMessage
PtInRect
GetWindowLongW
MapWindowPoints
DefWindowProcW
GetMessageW
TranslateMessage
RegisterClassExW
ShowWindow
FindWindowExW
MessageBoxIndirectW
SendMessageW
GetWindowThreadProcessId
GetShellWindow
LoadCursorW
GetWindowRect
DispatchMessageW
GetStringTypeW
HeapReAlloc
RtlUnwind
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
HeapCreate
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
IsProcessorFeaturePresent
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedIncrement
GetCPInfo
GetTimeZoneInformation
GetStdHandle
HeapSize
IsDebuggerPresent
CreateProcessW
HeapAlloc
HeapFree
GetProcessHeap
OpenProcess
GetLastError
SetLastError
GetProcAddress
GetModuleHandleA
CloseHandle
GetCurrentProcessId
FindResourceA
FreeResource
LoadResource
MoveFileExW
GetTickCount
VirtualFree
LoadLibraryW
SizeofResource
CreateFileW
GetTempPathW
VirtualAlloc
LockResource
LocalFree
GetModuleHandleW
Sleep
DeleteCriticalSection
CopyFileW
DeleteFileW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
ExitProcess
CreateMutexW
MapViewOfFile
UnmapViewOfFile
SetEvent
OpenFileMappingW
OpenEventW
ReleaseMutex
GetVersionExW
GetModuleFileNameW
GetFileSize
FindFirstFileW
SetFilePointer
VirtualQuery
FreeLibrary
WideCharToMultiByte
ReadFile
MultiByteToWideChar
FindClose
RemoveDirectoryW
FindNextFileW
InterlockedDecrement
GetVersion
FindResourceW
GetCurrentThreadId
SetStdHandle
WriteConsoleW
FlushFileBuffers
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
LoadLibraryA
RaiseException
CreateDirectoryW
WriteFile
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetSystemTimeAsFileTime
DecodePointer
LocalAlloc
EncodePointer
SetEntriesInAclW
SetSecurityInfo
AllocateAndInitializeSid
GetSecurityInfo
DuplicateTokenEx
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
FreeSid
SHGetSpecialFolderPathW
ShellExecuteW
CoInitializeEx
CoCreateGuid
CoCreateInstance
VariantClear
VariantInit
SysAllocString
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ