Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
c54e5cf192d3f08a2a3e49c3af18f525.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c54e5cf192d3f08a2a3e49c3af18f525.exe
Resource
win10v2004-20240226-en
Target
c54e5cf192d3f08a2a3e49c3af18f525
Size
346KB
MD5
c54e5cf192d3f08a2a3e49c3af18f525
SHA1
2441680d9a212d06de4506a2025a8f34c149d30c
SHA256
1654972d3354da7f0f12b6c539b04944cbadaa56cf215645be15959e6f613178
SHA512
8e29a37156a2fdfa5503eb55e76ea44404e7b3ca56267ca4ed57afaf80516bef4c39528b827abc382fa27e70d2942e5a6ab9edbfed50f8287034e1f417794d90
SSDEEP
1536:k3n4OcLgS4Pcpn/zO0r9aJfXgY1zUTyr5hVzUrllGAi2:k3GAPcp7O0r+XgTTSjpUG
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
AcroRd32Exe.pdb
CloseHandle
UnmapViewOfFile
CreateFileA
VirtualQueryEx
GetCurrentProcess
MapViewOfFile
CreateFileMappingW
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
ReadFile
SetFilePointer
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
GetModuleFileNameA
SizeofResource
LockResource
LoadResource
FindResourceW
GetSystemInfo
MultiByteToWideChar
LoadLibraryW
FreeLibrary
GetProcAddress
GetSystemDirectoryW
GetModuleHandleW
WaitForSingleObject
CreateSemaphoreW
ReleaseSemaphore
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetVersionExA
IsDebuggerPresent
OutputDebugStringA
GetVersionExW
HeapSize
GetProcessHeap
GetCurrentThreadId
FindResourceExW
GetCurrentProcessId
GetThreadLocale
GetLocaleInfoA
GetACP
GetSystemTimeAsFileTime
Sleep
InterlockedCompareExchange
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
InterlockedExchange
MessageBoxW
SendMessageW
FindWindowW
UnregisterClassA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
RegOpenKeyW
RegQueryValueExW
RegCloseKey
RegOpenKeyExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDI@Z
??2@YAPAXI@Z
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
??_V@YAXPAX@Z
strchr
strrchr
free
strcpy
malloc
strlen
strcmp
memcpy_s
wcslen
memset
_stricmp
wcscat_s
?terminate@@YAXXZ
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
??3@YAXPAX@Z
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
__CxxFrameHandler3
_snprintf
??0exception@std@@QAE@ABQBDH@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE