Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
7dfb3a1ee77078d47304b4d63220f89e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7dfb3a1ee77078d47304b4d63220f89e.exe
Resource
win10v2004-20231215-en
Target
7dfb3a1ee77078d47304b4d63220f89e
Size
876KB
MD5
7dfb3a1ee77078d47304b4d63220f89e
SHA1
4e4373b59eb34f40eb708b481d05f7b9c273f386
SHA256
9653f7469d8477cb1ab61caeb7be0d3c623bdda748d4de556c3e441d36a2d7ae
SHA512
63d4e9227e50cda4a006b38ecc560d562e287c07a5a2a0233d36ce56861ee602080744d169ec773232a2e30663458df1e784e356f0519e828385546551ab510a
SSDEEP
24576:Aymrp2lQQe6rDxWLDpYw49jXEWtEwItcGUf+iFC:Axd2ne+ktYw49j0WtEUfX
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetTimeZoneInformation
GetModuleFileNameA
GetCommandLineA
FindCloseChangeNotification
FindFirstFileA
GetWindowsDirectoryA
GetTapeParameters
GetTapeStatus
WritePrivateProfileStringA
GetComputerNameA
ReadProcessMemory
ReleaseSemaphore
SetConsoleTextAttribute
GetTempPathA
LocalFileTimeToFileTime
LocalLock
VirtualFree
GetProfileStringA
GetStdHandle
TlsSetValue
BuildCommDCBA
ResetEvent
IsValidCodePage
SetCommTimeouts
WaitForMultipleObjects
GetConsoleCursorInfo
DeleteAtom
GetAtomNameA
PrepareTape
SetFileApisToOEM
RequestDeviceWakeup
LocalAlloc
Process32Next
lstrcpy
SetNamedPipeHandleState
LocalUnlock
GenerateConsoleCtrlEvent
CopyFileA
_lclose
GetShortPathNameA
InterlockedExchange
GetStringTypeExA
CreateConsoleScreenBuffer
EnumResourceTypesA
GetExitCodeThread
SetStdHandle
GetCommConfig
GetProcessVersion
FlushInstructionCache
DeleteFileA
SizeofResource
PeekNamedPipe
WriteProcessMemory
SetConsoleWindowInfo
GetNamedPipeHandleStateA
IsBadWritePtr
HeapCompact
FatalExit
SetConsoleActiveScreenBuffer
TransactNamedPipe
StrToIntExA
PathFileExistsA
StrCSpnA
PathStripToRootA
PathSearchAndQualifyA
SHDeleteValueA
SHRegWriteUSValueA
StrRChrIA
PathIsRelativeA
PathIsFileSpecA
SHIsLowMemoryMachine
PathQuoteSpacesA
HashData
StrIsIntlEqualA
SHRegOpenUSKeyA
UrlIsOpaqueA
StrFormatByteSize64A
SHRegEnumUSKeyA
PathGetDriveNumberA
PathIsUNCA
ColorHLSToRGB
AssocQueryStringA
StrChrIA
SHCreateStreamWrapper
SHAutoComplete
PathCommonPrefixA
SHRegCreateUSKeyA
StrSpnA
UrlCombineA
PathMakePrettyA
RemovePropA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ