Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
9c618eacd855153cfcbd6a5bacfa8a2a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c618eacd855153cfcbd6a5bacfa8a2a.exe
Resource
win10v2004-20231215-en
Target
9c618eacd855153cfcbd6a5bacfa8a2a
Size
65KB
MD5
9c618eacd855153cfcbd6a5bacfa8a2a
SHA1
033e7967cb01a5b64fdaf17429bebd701cf0e1ec
SHA256
6c03fb379c61147dd73317730deae0fc7366daf6bbb16f5e8cd1d2747629a7c2
SHA512
f6288c5397f76b9b924d3b7f44ca780cb6ebb2fd81792bfbb3964f337b029b47498f6796d6f46ebd39154cb6e37a1ac3544c982b8ce4055841a04f28d6ed0a92
SSDEEP
1536:OqY0LxrTRqTrW4WV0fqazCr795xbrwQEwrB8p2C24EWmMzbMzIDIvb:LrQTrW5V0qazCr795xbTi8CYWmMzbMzv
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHCreateStreamWrapper
PathCommonPrefixA
PathIsRelativeA
SHAutoComplete
PathFileExistsA
UrlGetLocationA
SHRegWriteUSValueA
SHRegEnumUSKeyA
PathIsFileSpecA
ColorHLSToRGB
StrToIntExA
PathFindOnPathA
UrlIsOpaqueA
StrChrIA
StrRChrIA
PathMakePrettyA
AssocQueryStringA
HashData
SHDeleteValueA
PathGetDriveNumberA
PathSearchAndQualifyA
StrIsIntlEqualA
SHIsLowMemoryMachine
PathQuoteSpacesA
SHRegOpenUSKeyA
StrSpnA
UrlCombineA
StrFormatByteSize64A
PathIsUNCA
SHRegCreateUSKeyA
PathRemoveBlanksA
PathStripToRootA
ReadProcessMemory
GlobalUnlock
WriteProfileStringA
GetConsoleCursorInfo
GetLogicalDriveStringsA
SetConsoleActiveScreenBuffer
GlobalCompact
GetFullPathNameA
EnumSystemLocalesA
OpenSemaphoreA
EnumResourceTypesA
SetFilePointer
SetDefaultCommConfigA
SetEvent
GetPrivateProfileIntA
InterlockedIncrement
LockFileEx
LocalAlloc
GetCurrentProcessId
HeapUnlock
VirtualQueryEx
WinExec
EnumResourceLanguagesA
IsProcessorFeaturePresent
GetTempPathA
CreateMailslotA
GetOverlappedResult
PurgeComm
GetExitCodeThread
CancelIo
QueryPerformanceCounter
GetSystemDirectoryA
SetTapeParameters
_lclose
MoveFileA
FindNextChangeNotification
WriteProcessMemory
GetProcessHeaps
GetDiskFreeSpaceA
CreateProcessA
GetCPInfoExA
ReadConsoleOutputA
FindCloseChangeNotification
GlobalLock
SetConsoleOutputCP
DeleteFileA
GetCurrentDirectoryA
GetAtomNameA
ClearCommBreak
GetVersionExA
WaitForMultipleObjects
CopyFileA
WriteFile
GetProfileIntA
CreateFileMappingA
UnlockFileEx
SetSystemTime
FlushInstructionCache
DlgDirSelectExA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ