Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
7094856df10ef2dd88f8a670f7c2d52f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7094856df10ef2dd88f8a670f7c2d52f.exe
Resource
win10v2004-20231222-en
Target
7094856df10ef2dd88f8a670f7c2d52f
Size
876KB
MD5
7094856df10ef2dd88f8a670f7c2d52f
SHA1
dccc92049017426d2e755de08a0f06473fe01dbf
SHA256
81ecd19ee12d2ee829025c0a13a193bffc6340432cf48676bdbcd689c8870147
SHA512
9b7f065cc17683edab4782955ed6adda4f6a8485fca0b45c84745b7be2357926ccc12781d30eb8083f23ea62c3d1d89745b8425f617af567a81e8aed99d636fb
SSDEEP
12288:Dy2Nk+V+m8pnShmiF6L1XeTCtQJCMQ2dDiSjoFI2HuSA0GvpJgS8XLnAP:uR+MKTc1XeTSC4QuS6IDpPvpJwTA
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetConsoleActiveScreenBuffer
MapViewOfFile
LocalFileTimeToFileTime
CloseHandle
ExitProcess
GetCommandLineA
LoadModule
FatalExit
GetLongPathNameA
GlobalFlags
TransactNamedPipe
GetNumberFormatA
SetupComm
SystemTimeToTzSpecificLocalTime
SetVolumeLabelA
VirtualFree
GetNamedPipeHandleStateA
GetCurrentProcessId
ReadFileEx
GetProcessHeaps
MoveFileA
GetProfileStringA
HeapCompact
EnumResourceTypesA
Beep
LoadLibraryA
SetCommMask
VirtualAlloc
GetSystemPowerStatus
EnumSystemLocalesA
GetProcessShutdownParameters
ClearCommBreak
GetPrivateProfileIntA
GetWindowsDirectoryA
GetCurrentThreadId
FindFirstFileA
SetTapeParameters
lstrcat
GlobalUnlock
IsProcessorFeaturePresent
SetLocalTime
ReadConsoleA
PrepareTape
GetDriveTypeA
HeapWalk
GetCPInfoExA
CancelIo
FileTimeToLocalFileTime
lstrcmp
GetFileTime
GetComputerNameA
ReleaseSemaphore
RequestDeviceWakeup
CopyFileA
GetLogicalDriveStringsA
PeekNamedPipe
OutputDebugStringA
FillConsoleOutputAttribute
BackupSeek
SHIsLowMemoryMachine
SHRegCreateUSKeyA
StrSpnA
StrFormatByteSize64A
SHCreateStreamWrapper
PathSearchAndQualifyA
PathFileExistsA
SHAutoComplete
AssocQueryStringA
StrToIntExA
PathRemoveBlanksA
PathIsFileSpecA
ColorHLSToRGB
UrlIsOpaqueA
UrlCombineA
HashData
StrIsIntlEqualA
StrCSpnA
PathGetDriveNumberA
UrlGetLocationA
PathIsUNCA
PathMakePrettyA
PathFindOnPathA
SHRegEnumUSKeyA
PathIsRelativeA
SHRegWriteUSValueA
StrRChrIA
SHRegOpenUSKeyA
SHDeleteValueA
PathCommonPrefixA
PathQuoteSpacesA
CryptSetKeyParam
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ