Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
4c9b90e0732fe4e9af8107f53227f60f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4c9b90e0732fe4e9af8107f53227f60f.exe
Resource
win10v2004-20231222-en
Target
4c9b90e0732fe4e9af8107f53227f60f
Size
13.2MB
MD5
4c9b90e0732fe4e9af8107f53227f60f
SHA1
7e6f7071dbe27080faef4098bed04c6036cddd5b
SHA256
4c97fa9530e5b592444ee3d164ac4683ac2d7c86dfe3ded64edb7239ea74b94d
SHA512
a8f9d5cba12fd23d7b851999810431e62e8969816e25ac72a4f766341a9d37e877b0933181c765c38c619d3e8c837a83159f8be3516adf498c8f1f207222f47d
SSDEEP
393216:va/DBRfQdaFm5bwwGSY5TTSgJgNx82H6jC4b:Avua41fGSoOgSNxPH74b
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
UuidToStringW
RpcStringFreeW
PathFindFileNameW
StrCmpIW
SHDeleteKeyW
SHDeleteValueW
PathRemoveExtensionW
SHGetValueW
SHSetValueW
CreateWindowExW
GetSystemMetrics
LoadIconW
GetMessageW
TranslateMessage
DispatchMessageW
GetWindowRect
PostQuitMessage
FindWindowExA
SendMessageW
DefWindowProcW
ShowWindow
MessageBoxW
MessageBoxIndirectW
GetWindowThreadProcessId
GetShellWindow
RegisterClassExW
LoadCursorW
PostMessageW
GetConsoleCP
QueryPerformanceCounter
HeapCreate
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
IsProcessorFeaturePresent
HeapSize
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedIncrement
GetCPInfo
GetTimeZoneInformation
IsDebuggerPresent
VirtualFree
VirtualAlloc
GetFileSize
FindFirstFileW
SetFilePointer
VirtualQuery
GetCurrentProcess
GetCurrentThread
WriteFile
OpenProcess
WideCharToMultiByte
GetVersionExW
TerminateProcess
ReadFile
CreateFileW
MultiByteToWideChar
GetConsoleMode
SetLastError
FindClose
Process32FirstW
RemoveDirectoryW
Process32NextW
FindNextFileW
CreateToolhelp32Snapshot
CloseHandle
DeleteFileW
GetCurrentProcessId
GetTickCount
GetTempPathW
CreateProcessW
HeapAlloc
HeapFree
GetProcessHeap
GetProcAddress
GetModuleHandleA
FindResourceA
FreeResource
LoadResource
LoadLibraryW
SizeofResource
LockResource
ExitProcess
CreateMutexW
CreateDirectoryW
GetModuleHandleW
Sleep
CopyFileW
GetModuleFileNameW
FindResourceW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
MapViewOfFile
RaiseException
OpenEventA
OpenFileMappingA
LocalFree
InterlockedDecrement
GetVersion
MoveFileExW
GetCurrentThreadId
GetStringTypeW
RtlUnwind
HeapReAlloc
SetStdHandle
WriteConsoleW
FlushFileBuffers
CompareStringW
SetEnvironmentVariableA
LoadLibraryA
InterlockedExchange
FreeLibrary
GetLastError
SetEvent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
GetCommandLineA
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
LocalAlloc
SetEntriesInAclW
SetSecurityInfo
AllocateAndInitializeSid
GetSecurityInfo
DuplicateTokenEx
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenThreadToken
OpenProcessToken
FreeSid
SHGetSpecialFolderPathW
SHChangeNotify
ShellExecuteW
CoCreateGuid
CoUninitialize
CoInitialize
CoCreateInstance
SysAllocString
SysFreeString
VariantClear
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ