Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
f4c8369e4de1f12cc5a71eb5586b38fc78a9d8db2b189b8c25ef17a572d4d6b7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f4c8369e4de1f12cc5a71eb5586b38fc78a9d8db2b189b8c25ef17a572d4d6b7.exe
Resource
win10v2004-20231222-en
Target
45a1ac6973b95ecfd20bc18f35a68f18.bin
Size
138KB
MD5
d888cb2203b57497502d830fb454bcf7
SHA1
b28a7b7c62e4a61e136bddec4f22bf3bc56cb257
SHA256
234470d3c8b6657a92ad99a0f35de4e6f9e976b3fc0e8eb2569f2e53c27272c7
SHA512
cb3a5d9e94e451c6ad34134259056318aa0553bc16ff1c2cba5c8e2e3efd20bf9ca27fbc8bb67382b388265826c289e13d11e9f7f2ddc4c9e21ea3b3dfe762e3
SSDEEP
3072:HhM+BLG48fvfd1ivPJ7+VG+vPBQ75PBc2wB+XkR6/oBCTDh/:HhMn48l1ip7+Y+hQRCEXfzTDR
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
EnumProcessModules
GetModuleBaseNameW
CreateProcessW
GetCurrentProcess
InitializeCriticalSection
OpenProcess
GetLastError
ContinueDebugEvent
WaitForDebugEvent
ResumeThread
CreateThread
FormatMessageW
MultiByteToWideChar
ExpandEnvironmentStringsW
TerminateProcess
SetConsoleCtrlHandler
GetFullPathNameW
SystemTimeToTzSpecificLocalTime
GetFileAttributesW
GetEnvironmentVariableA
GetCurrentDirectoryW
Process32FirstW
GetSystemInfo
WaitForMultipleObjects
Process32NextW
IsDebuggerPresent
CreateToolhelp32Snapshot
DebugBreak
GetSystemTime
ExitProcess
DebugActiveProcessStop
Sleep
SetFilePointerEx
GetTimeFormatW
CreateFileW
ReleaseSemaphore
GetFileSizeEx
CreateSemaphoreW
GetProcessId
DeleteFileW
SetLastError
DeviceIoControl
VirtualQueryEx
SetStdHandle
HeapReAlloc
WriteConsoleW
OutputDebugStringW
LoadLibraryExW
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
DebugActiveProcess
OpenThread
ReadProcessMemory
GetTickCount
GetThreadContext
GetDateFormatW
DeleteCriticalSection
WaitForSingleObject
SetEndOfFile
CloseHandle
EnterCriticalSection
LeaveCriticalSection
SetEvent
GetModuleFileNameW
GetVersionExW
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryW
GetModuleHandleW
GetCommandLineW
CreateEventW
ReadFile
ReadConsoleW
FreeLibrary
GetFileType
GetConsoleCP
FlushFileBuffers
GetStringTypeW
HeapSize
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapFree
HeapAlloc
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
IsProcessorFeaturePresent
EncodePointer
DecodePointer
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
GetProcessHeap
GetModuleHandleExW
WideCharToMultiByte
GetStdHandle
WriteFile
RtlCaptureContext
RtlVirtualUnwind
SendMessageW
GetDlgItem
InflateRect
LoadCursorW
DialogBoxIndirectParamW
SetWindowTextW
EndDialog
GetSysColorBrush
wsprintfW
IsHungAppWindow
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
LoadStringA
SetCursor
StartPage
GetDeviceCaps
SetMapMode
StartDocW
EndDoc
EndPage
PrintDlgW
EnumServicesStatusExW
OpenSCManagerW
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegOpenKeyW
RegQueryValueExW
RegCreateKeyW
CommandLineToArgvW
CoUninitialize
CoInitializeEx
CoAllowSetForegroundWindow
CoCreateInstance
CLSIDFromString
PdhOpenQueryW
PdhAddCounterW
PdhCollectQueryData
PdhGetFormattedCounterValue
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ