Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
ccf66b9c8fc68839f434cb82580e58dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccf66b9c8fc68839f434cb82580e58dc.exe
Resource
win10v2004-20240226-en
Target
ccf66b9c8fc68839f434cb82580e58dc
Size
339KB
MD5
ccf66b9c8fc68839f434cb82580e58dc
SHA1
ce893ef4247d1ffc4789275efb19e45724a2051a
SHA256
4b38424fcde75109858300be6488bfb8cab76d2daad79fc5234044591cd9b842
SHA512
0895e2813d6a273ac1c24f3f7ecbc0ef2b4e0c252c6c3939cf8a12ccc134195b9ef7796e309829bd7b8d579a56c972dab5e366e41d3dbb27da9346ebe0bd834e
SSDEEP
6144:W/FYWolEtENGk+evbgNYz0vKbGoEFvw2IjSm9wFvC:qFZolqkJ+YAvKbGlo2IjUa
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
P:\Target\x86\ship\dw\x-none\dwtrig20.pdb
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegEnumValueW
RegOpenKeyExA
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
OpenThreadToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidA
SetSecurityDescriptorDacl
IsValidSid
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetSecurityDescriptorDacl
GetLengthSid
EqualSid
CreateWellKnownSid
CopySid
AddAccessDeniedAce
AddAccessAllowedAce
OpenProcessToken
InitializeCriticalSectionEx
GetShortPathNameA
LoadResource
SizeofResource
FindResourceW
IsWow64Process
MultiByteToWideChar
lstrcmpiW
GlobalFree
GlobalAlloc
GetSystemWindowsDirectoryW
CreateProcessW
Sleep
GetLastError
CloseHandle
GetShortPathNameW
GetLongPathNameW
GetFileAttributesW
lstrlenW
SetLastError
WideCharToMultiByte
IsValidCodePage
CreateMutexA
OpenMutexA
HeapAlloc
HeapFree
GetProcessHeap
GetCurrentProcess
LocalAlloc
LocalFree
GetCurrentThread
QueryPerformanceCounter
WaitForSingleObjectEx
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeSListHead
GetCurrentProcessId
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
RtlUnwind
RaiseException
EncodePointer
FreeLibrary
LoadLibraryExW
GetThreadTimes
VirtualProtect
HeapSize
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameA
ExitProcess
GetCommandLineA
GetCommandLineW
GetACP
GetStringTypeW
GetFileType
HeapReAlloc
CompareStringW
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
CreateFileW
GetSystemInfo
VirtualQuery
LoadLibraryExA
CreateEventW
WaitForSingleObject
SetEvent
GetSystemTimeAsFileTime
ResetEvent
StringFromIID
CoCreateInstance
CoTaskMemFree
StringFromCLSID
CoRevokeClassObject
CoRegisterClassObject
CoInitializeEx
CoUninitialize
CoCreateGuid
LoadRegTypeLi
SysFreeString
SysAllocString
LoadTypeLi
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ