Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
20cfc8923d53d79a40780e716a31f592.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20cfc8923d53d79a40780e716a31f592.exe
Resource
win10v2004-20231215-en
Target
20cfc8923d53d79a40780e716a31f592
Size
65KB
MD5
20cfc8923d53d79a40780e716a31f592
SHA1
da205a605c64c206d00f23321f0a74f677f07790
SHA256
fb0e349fc713c85c1e0ca9786f9bb90f3e7c4d56ba5b9dfe206bf736fcb76ae5
SHA512
24b667997a81feb058f0c2b3bc75378b9a7b07877387d54e102fc7f51116a5bae7bc779682c5cf27e3ce09155d53543fc5d7f3b9a96ee3255c55ec5d3ddaeba5
SSDEEP
1536:MS/5GZnT3JguBHVAeLj+xP1Ar//8JnDla+P4nSTK2lDKsb:qdlg+CeexP1I/QDvP4STKuDKG
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetConsoleOutputCP
GetProcessShutdownParameters
VirtualLock
SetConsoleCursorPosition
RequestDeviceWakeup
DebugActiveProcess
VirtualAlloc
GetProfileIntA
GenerateConsoleCtrlEvent
LocalUnlock
UTRegister
GetSystemTimeAdjustment
SetupComm
FileTimeToLocalFileTime
MapViewOfFile
HeapWalk
Heap32ListNext
SetCommTimeouts
GetPrivateProfileStructA
ReadProcessMemory
VirtualFree
GetOverlappedResult
GetCPInfoExA
InterlockedExchange
GetTapeStatus
GetTimeZoneInformation
SetCommMask
GetConsoleTitleA
FlushConsoleInputBuffer
LocalFree
TerminateThread
DisconnectNamedPipe
lstrcpyn
ExitProcess
GetCurrentProcessId
lstrcmpi
VirtualQueryEx
TlsSetValue
SetEvent
WaitCommEvent
WritePrivateProfileStringA
HeapDestroy
OutputDebugStringA
GetUserDefaultLangID
GetWindowsDirectoryA
ReadConsoleA
WinExec
SetConsoleCtrlHandler
GetBinaryTypeA
SetSystemTime
IsBadReadPtr
GetAtomNameA
WriteProcessMemory
CreateFiber
LocalFileTimeToFileTime
GetExitCodeThread
SetProcessAffinityMask
SetVolumeLabelA
GetProcessVersion
SHRegCreateUSKeyA
UrlIsOpaqueA
PathCommonPrefixA
ColorHLSToRGB
PathQuoteSpacesA
SHRegWriteUSValueA
StrCSpnA
UrlGetLocationA
StrChrIA
PathIsRelativeA
SHIsLowMemoryMachine
SHAutoComplete
PathStripToRootA
PathSearchAndQualifyA
SHCreateStreamWrapper
StrSpnA
PathIsUNCA
SHRegEnumUSKeyA
SHRegOpenUSKeyA
StrFormatByteSize64A
UrlCombineA
PathAppendA
HashData
StrToIntExA
PathFileExistsA
SHDeleteValueA
PathMakePrettyA
StrIsIntlEqualA
AssocQueryStringA
PathFindOnPathA
StrRChrIA
BackupEventLogA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ