Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
50f69ec43390f3249ae17357c4c423b2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
50f69ec43390f3249ae17357c4c423b2.exe
Resource
win10v2004-20231222-en
Target
50f69ec43390f3249ae17357c4c423b2
Size
614KB
MD5
50f69ec43390f3249ae17357c4c423b2
SHA1
79cc5bfcbc944ed0a7597a5825a4b7d92e62e410
SHA256
fba9d8a298da8a38b70660d9bb66a30b97b004814849b266e0688842e6ca8088
SHA512
007a7fbd380243ba016a884c5c71237d66d95b54d3705e87d9cdc7f916b291a70e6b86e2eb98dc05b581b9e5e4bb8ea79592a733c5061d209b4fcc6a5c3e5632
SSDEEP
12288:ydrbA/jJsCJr/XOYC8FiygeH3XIPLb3eOFxqDTuDhwAg07qYGy2Er9cThCz:ycsM3AeIXTxq/umAg07qYl20WThCz
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sleep
Process32NextW
OutputDebugStringW
LockResource
Process32FirstW
CloseHandle
LoadResource
FindResourceW
GetModuleHandleW
GetTickCount
HeapFree
InitializeCriticalSectionAndSpinCount
HeapSize
GetLastError
HeapReAlloc
RaiseException
HeapAlloc
DecodePointer
DeleteCriticalSection
GetProcessHeap
CreateDirectoryW
ReadFile
FindFirstFileW
FindNextFileW
lstrlenW
WriteFile
RemoveDirectoryW
SetFilePointer
GetTempPathW
FindClose
CreateFileW
DeleteFileW
GetFileSize
GetVersionExW
MultiByteToWideChar
GetNativeSystemInfo
WideCharToMultiByte
SetEndOfFile
GetPrivateProfileStringW
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
CreateToolhelp32Snapshot
OpenProcess
FreeResource
GetModuleFileNameW
TerminateProcess
OutputDebugStringA
GetPrivateProfileIntW
ReadConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetACP
GetStdHandle
SizeofResource
GetModuleHandleExW
ExitProcess
GetFileType
GetCommandLineW
GetCommandLineA
LoadLibraryExW
FreeLibrary
RtlUnwind
InitializeSListHead
lstrcpynW
WriteConsoleW
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
EncodePointer
SetLastError
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetProcAddress
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
LoadIconW
LoadCursorW
TranslateAcceleratorW
PostQuitMessage
DialogBoxParamW
DispatchMessageW
ShowWindow
LoadStringW
UpdateWindow
BeginPaint
EndPaint
MessageBoxExW
TranslateMessage
GetMessageW
DefWindowProcW
PostMessageW
DestroyWindow
CreateWindowExW
EndDialog
RegisterClassExW
LoadAcceleratorsW
SystemFunction036
RegOpenKeyExW
RegCloseKey
RegDeleteKeyExW
RegCreateKeyExW
RegDeleteTreeW
RegQueryValueExW
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteExW
SHFileOperationW
CoUninitialize
CoInitialize
PathFileExistsW
PathUnquoteSpacesW
HttpOpenRequestW
InternetCloseHandle
InternetConnectW
InternetReadFile
HttpSendRequestW
InternetOpenW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ