Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
f8ca902c903e6ca61d57bd69bd074d80.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f8ca902c903e6ca61d57bd69bd074d80.exe
Resource
win10v2004-20231215-en
Target
f8ca902c903e6ca61d57bd69bd074d80
Size
4.0MB
MD5
f8ca902c903e6ca61d57bd69bd074d80
SHA1
01553c921aad3b700d74eebbc5a8ef3d04cb78cb
SHA256
5b96b5a1333ffee03618124fad5ee8363f48d3e80e3e75c3e684a1a228e8eff9
SHA512
3fd2133ea8e19b126270339c79050632ab20e69a3619e5d97dd6e6dbac2053cded4b274323c7e3a836c467ef2811c3e6f75f209f85b7ae43d3cfa8762b602a5f
SSDEEP
98304:JjlZcS44lJH2PGb1GFIJ4jfbYGaXIMxaV99cQrRkTlLLB:3ZcS44lJegzJ4jTYGaXBxicX
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WSAStartup
UuidToStringW
RpcStringFreeW
SHDeleteValueW
PathFindFileNameW
PathRemoveExtensionW
SHSetValueW
SHDeleteKeyW
SHGetValueW
SetWindowLongW
CreateWindowExW
GetSystemMetrics
LoadIconW
PostQuitMessage
PtInRect
GetWindowLongW
MapWindowPoints
DefWindowProcW
GetMessageW
TranslateMessage
RegisterClassExW
ShowWindow
FindWindowExW
MessageBoxIndirectW
SendMessageW
GetWindowThreadProcessId
GetShellWindow
LoadCursorW
GetWindowRect
DispatchMessageW
GetStringTypeW
HeapReAlloc
RtlUnwind
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
HeapCreate
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
IsProcessorFeaturePresent
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedIncrement
GetCPInfo
GetTimeZoneInformation
GetStdHandle
HeapSize
IsDebuggerPresent
CreateProcessW
HeapAlloc
HeapFree
GetProcessHeap
OpenProcess
GetLastError
SetLastError
GetProcAddress
GetModuleHandleA
CloseHandle
GetCurrentProcessId
FindResourceA
FreeResource
LoadResource
MoveFileExW
GetTickCount
VirtualFree
LoadLibraryW
SizeofResource
CreateFileW
GetTempPathW
VirtualAlloc
LockResource
LocalFree
GetModuleHandleW
Sleep
DeleteCriticalSection
CopyFileW
DeleteFileW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
ExitProcess
CreateMutexW
MapViewOfFile
UnmapViewOfFile
SetEvent
OpenFileMappingW
OpenEventW
ReleaseMutex
GetVersionExW
GetModuleFileNameW
GetFileSize
FindFirstFileW
SetFilePointer
VirtualQuery
FreeLibrary
WideCharToMultiByte
ReadFile
MultiByteToWideChar
FindClose
RemoveDirectoryW
FindNextFileW
InterlockedDecrement
GetVersion
FindResourceW
GetCurrentThreadId
SetStdHandle
WriteConsoleW
FlushFileBuffers
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
LoadLibraryA
RaiseException
CreateDirectoryW
WriteFile
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetSystemTimeAsFileTime
DecodePointer
LocalAlloc
EncodePointer
SetEntriesInAclW
SetSecurityInfo
AllocateAndInitializeSid
GetSecurityInfo
DuplicateTokenEx
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
FreeSid
SHGetSpecialFolderPathW
ShellExecuteW
CoInitializeEx
CoCreateGuid
CoCreateInstance
VariantClear
VariantInit
SysAllocString
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ