Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
784ed731517a1daa1528caff6cc4cd06.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
784ed731517a1daa1528caff6cc4cd06.exe
Resource
win10v2004-20231215-en
Target
784ed731517a1daa1528caff6cc4cd06
Size
276KB
MD5
784ed731517a1daa1528caff6cc4cd06
SHA1
d6e0cc3736187e2a0dc2b18cabd7bb0f15172a65
SHA256
404c4fc2b5b9c6781b8915d599d47a2d21db4f1e3e879b3a374cb692132559ce
SHA512
cfba25f05341a5619f57c7d6c9c0933c28ad8aa58c69262b417b77a13710be7ab6bb1853998ee5927ea5e67394f7cd6038a62256d7286368ec884132f78713f8
SSDEEP
6144:W/FYWolEtENGk+evbgNYz0vKbGoEFvwE35:qFZolqkJ+YAvKbGloE35
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
P:\Target\x86\ship\dw\x-none\dwtrig20.pdb
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegEnumValueW
RegOpenKeyExA
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
OpenThreadToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidA
SetSecurityDescriptorDacl
IsValidSid
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetSecurityDescriptorDacl
GetLengthSid
EqualSid
CreateWellKnownSid
CopySid
AddAccessDeniedAce
AddAccessAllowedAce
OpenProcessToken
InitializeCriticalSectionEx
GetShortPathNameA
LoadResource
SizeofResource
FindResourceW
IsWow64Process
MultiByteToWideChar
lstrcmpiW
GlobalFree
GlobalAlloc
GetSystemWindowsDirectoryW
CreateProcessW
Sleep
GetLastError
CloseHandle
GetShortPathNameW
GetLongPathNameW
GetFileAttributesW
lstrlenW
SetLastError
WideCharToMultiByte
IsValidCodePage
CreateMutexA
OpenMutexA
HeapAlloc
HeapFree
GetProcessHeap
GetCurrentProcess
LocalAlloc
LocalFree
GetCurrentThread
QueryPerformanceCounter
WaitForSingleObjectEx
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeSListHead
GetCurrentProcessId
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
RtlUnwind
RaiseException
EncodePointer
FreeLibrary
LoadLibraryExW
GetThreadTimes
VirtualProtect
HeapSize
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameA
ExitProcess
GetCommandLineA
GetCommandLineW
GetACP
GetStringTypeW
GetFileType
HeapReAlloc
CompareStringW
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
CreateFileW
GetSystemInfo
VirtualQuery
LoadLibraryExA
CreateEventW
WaitForSingleObject
SetEvent
GetSystemTimeAsFileTime
ResetEvent
StringFromIID
CoCreateInstance
CoTaskMemFree
StringFromCLSID
CoRevokeClassObject
CoRegisterClassObject
CoInitializeEx
CoUninitialize
CoCreateGuid
LoadRegTypeLi
SysFreeString
SysAllocString
LoadTypeLi
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ