Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
24b19b4bd9a52034015a4f2ce4b3b8e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24b19b4bd9a52034015a4f2ce4b3b8e9.exe
Resource
win10v2004-20231215-en
Target
24b19b4bd9a52034015a4f2ce4b3b8e9
Size
66KB
MD5
24b19b4bd9a52034015a4f2ce4b3b8e9
SHA1
fc56f7b81fe76cd005af61d5ea2f4d9f627f7e67
SHA256
aef81da988310a5e121e3e2f895e0e3bb727dcaf3881fa7e36b3b454c7360435
SHA512
5745a2e161bf8f0b24cf2122a783efbd1b957a60b7e2556ad01ef18beda19a7904861e96d5080150c93587162d9e14cf1640420698793d0d4b1e39d22aee7c66
SSDEEP
768:6sz3Mfz6JrSM+h9ooJlZ6jtvhrJ+I+BqeLqSft8kjMiJ38KQCVtLWQbC5U:6xz65YrxZ67rJhknVaiJ38+VtaECu
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord2614
ord861
ord924
ord858
ord939
ord2818
ord537
ord540
ord823
ord860
ord825
ord535
ord800
__RTDynamicCast
wcslen
_wtol
atoi
_mbsicmp
__p___argc
__p___argv
_strdup
isalnum
isspace
strtoul
memcmp
memset
_itoa
_strnicmp
free
malloc
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_mbscmp
sprintf
__CxxFrameHandler
_mbsnicmp
_mbsspn
_mbscspn
strlen
memcpy
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_mbsnbcpy
_acmdln
_stricmp
GetTempPathA
lstrlenW
GetTempFileNameA
GetProcAddress
LoadLibraryA
lstrcpyA
CreateProcessA
GetEnvironmentVariableA
OutputDebugStringA
GetLastError
MultiByteToWideChar
lstrlenA
FreeLibrary
GetStartupInfoA
Sleep
GetModuleHandleA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
CopyFileA
WideCharToMultiByte
CharNextA
TranslateMessage
DispatchMessageA
wsprintfA
IsWindow
PostMessageA
EndDialog
PostQuitMessage
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassExA
GetMessageA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
ShellExecuteA
CoTaskMemAlloc
CreateBindCtx
CoTaskMemFree
CoInitialize
SysAllocStringLen
SysAllocString
SysFreeString
RegisterBindStatusCallback
RevokeBindStatusCallback
CreateURLMoniker
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBGABV?$allocator@G@1@@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?empty@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE_NXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?c_str@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEPBGXZ
InternetCrackUrlA
StrStrIW
PathFindExtensionA
PathFindFileNameA
PathAppendA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ