Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
475244dfbb7bdc6226fa3fbe3ac2077d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
475244dfbb7bdc6226fa3fbe3ac2077d.exe
Resource
win10v2004-20231215-en
Target
475244dfbb7bdc6226fa3fbe3ac2077d
Size
875KB
MD5
475244dfbb7bdc6226fa3fbe3ac2077d
SHA1
b2353fbb5cbe7e1cdb0ef9dbeec5db75aa8bd514
SHA256
fc057437431eb35516d47774c08d9b361267bea13d9bf4230cd7ccf3b532afcc
SHA512
111105cdefcf6194f0f445cf21e07530e522a4111a72208fcaebf8d414c77ffc6e611e7853ca790db03a77fcf6b39fe174585fc3a35f430d6cdab12316f45a50
SSDEEP
24576:NeFa2MMgqOt1TbKG8Me6cg70Kb9Bu7M8jc1h:wFa2MMgqOt1gMiMhB2Mg
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PathRemoveBlanksA
PathFindOnPathA
UrlIsOpaqueA
StrToIntExA
StrChrIA
SHRegOpenUSKeyA
UrlCombineA
PathIsUNCA
PathIsRelativeA
StrRChrIA
SHRegCreateUSKeyA
PathStripToRootA
SHAutoComplete
StrSpnA
StrCSpnA
SHIsLowMemoryMachine
ColorHLSToRGB
AssocQueryStringA
PathGetDriveNumberA
PathAppendA
StrFormatByteSize64A
PathSearchAndQualifyA
PathQuoteSpacesA
PathMakePrettyA
HashData
SHRegEnumUSKeyA
PathFileExistsA
PeekNamedPipe
GetPrivateProfileStructA
lstrcmp
GetProcessAffinityMask
LocalShrink
FindCloseChangeNotification
GetOverlappedResult
GlobalFlags
SetEnvironmentVariableA
GlobalAddAtomA
TlsSetValue
SetCommMask
PurgeComm
PrepareTape
SetDefaultCommConfigA
GetLocalTime
GetStdHandle
DisconnectNamedPipe
SetStdHandle
WritePrivateProfileStringA
BackupSeek
WriteProfileStringA
GetConsoleCursorInfo
VirtualQueryEx
IsProcessorFeaturePresent
CreateFileMappingA
GetDriveTypeA
GetTickCount
GlobalUnWire
MoveFileA
InterlockedExchange
SetProcessAffinityMask
ReleaseSemaphore
GetSystemTimeAdjustment
GlobalReAlloc
QueueUserAPC
VirtualProtectEx
lstrcpyn
GlobalUnlock
FindAtomA
FreeLibrary
HeapWalk
SetConsoleTextAttribute
AreFileApisANSI
GetCurrentThreadId
GetBinaryTypeA
GetConsoleOutputCP
Heap32First
EnumSystemLocalesA
FatalExit
GetNumberFormatA
LocalAlloc
IsBadWritePtr
GetTapeStatus
UpdateResourceA
Thread32Next
CallNamedPipeA
FindResourceA
SetEvent
CopyFileA
GlobalLock
CloseHandle
ReadConsoleA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ