Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
56b772507cbe05a4cf34a385ee24d651.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56b772507cbe05a4cf34a385ee24d651.exe
Resource
win10v2004-20231215-en
Target
56b772507cbe05a4cf34a385ee24d651
Size
225KB
MD5
56b772507cbe05a4cf34a385ee24d651
SHA1
07eed7cad30a64af9bc04f23ac1d36c800b5f1aa
SHA256
23a1e3acdd9e460c48f3b97ecf980b00ae8b7a4ea8006cc13e0bfe6f4e971b3d
SHA512
457afb65de210ad22beca8aa8a7d60654368a0b1cdfaa94e290c6f17963d137c96555f4f560d7514b1c17c0d359b6b29b817e7c990552890eee56cfaedf26cbe
SSDEEP
3072:g0fN81j1g64U6DFVuCIJ46WoKEmd+k0kGwLtLkq4VYEMPvjC52Kk:gI81j1g6Uvt6WtjxWwxT4VYd
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHDeleteKeyA
PathAppendA
SHDeleteValueA
InitializeCriticalSection
CreateProcessA
GetProcAddress
LoadLibraryA
FreeLibrary
RemoveDirectoryA
DeleteFileA
CompareStringA
lstrlenA
GetModuleFileNameA
lstrcpyA
lstrcpynA
GetSystemDirectoryA
GetExitCodeProcess
GetFileAttributesA
CreateDirectoryA
WideCharToMultiByte
LoadResource
GetUserDefaultLangID
FindResourceExA
FindResourceA
SizeofResource
LockResource
CreateMutexA
GlobalFree
GlobalAlloc
GetCurrentProcess
GetModuleHandleA
GetVersionExA
GetEnvironmentVariableA
GetTickCount
GetTempPathA
TerminateProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
LocalFree
FormatMessageA
OutputDebugStringA
MultiByteToWideChar
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
WaitForSingleObject
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
SetFilePointer
WriteFile
ReadFile
CloseHandle
CreateFileA
GetLastError
FlushFileBuffers
SetLastError
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
LocalAlloc
InterlockedExchange
RaiseException
HeapAlloc
HeapFree
GetCurrentThreadId
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapReAlloc
HeapDestroy
HeapCreate
ExitProcess
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
Sleep
GetCPInfo
CreateDialogParamA
SetWindowTextA
MoveWindow
SetFocus
ShowWindow
SetForegroundWindow
LoadIconA
LoadCursorA
GetDlgItem
SendMessageA
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
SetDlgItemTextA
DestroyWindow
GetWindowRect
SystemParametersInfoA
GetSystemMetrics
GetForegroundWindow
MessageBoxA
CharPrevA
CharNextA
SetCursor
CryptReleaseContext
EqualSid
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
FreeSid
QueryServiceStatus
OpenSCManagerA
OpenServiceA
StartServiceA
CloseServiceHandle
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
CryptAcquireContextA
CryptGenRandom
SHGetFolderPathW
ShellExecuteExA
ShellExecuteA
SHGetFolderPathA
SHFileOperationA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ