Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
40636225ff0b9462804c97b3f441776104002cf6406d07231ee94350f610d19a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
40636225ff0b9462804c97b3f441776104002cf6406d07231ee94350f610d19a.exe
Resource
win10v2004-20240426-en
Target
40636225ff0b9462804c97b3f441776104002cf6406d07231ee94350f610d19a
Size
694KB
MD5
416f528045845fb4ec0eeb16a313868b
SHA1
e8a62282744483e91eee270a5d4f0f348c29bac8
SHA256
40636225ff0b9462804c97b3f441776104002cf6406d07231ee94350f610d19a
SHA512
bbcc9163807fd804e1806f719f07f99fd9591df6dfd0513d770150031d987d446c18beae5c9842bc53378fd673cbf14a71329e8c74e443b99ed330130be0671f
SSDEEP
12288:GkbEbxPFJfREONBJ4ElmONVZLoildo6RxOarEnCCnQ:GkYvfREgJFLKYOfQ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateDirectoryW
DeleteFileW
GetFileSize
WriteFile
ReadFile
GetModuleHandleW
CreateFileA
FindClose
FindNextFileW
GlobalFree
DeviceIoControl
GetSystemDirectoryA
IsDebuggerPresent
OutputDebugStringW
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetVersionExW
CreateFileW
LoadLibraryW
GetLogicalDriveStringsW
TerminateProcess
GetCurrentProcess
OpenProcess
LocalFree
LocalAlloc
GetProcAddress
FreeLibrary
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
MoveFileW
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
DeleteCriticalSection
GetProcessHeap
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
GetModuleFileNameW
QueueUserWorkItem
GetCommandLineW
SetCurrentDirectoryW
SetEvent
GetLastError
CloseHandle
CreateEventW
GetCurrentThreadId
GetCurrentProcessId
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
WriteConsoleW
ReadConsoleW
SetEndOfFile
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetACP
GetStdHandle
GetModuleHandleExW
ExitProcess
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetFileType
GetTimeZoneInformation
RtlUnwind
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
VirtualFree
VirtualProtect
VirtualAlloc
LoadLibraryExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
WaitForSingleObject
Sleep
TryEnterCriticalSection
GetStringTypeW
QueryPerformanceCounter
SetLastError
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterServiceCtrlHandlerW
SetServiceStatus
SetTokenInformation
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
GetUserNameW
RegisterEventSourceW
DeregisterEventSource
ReportEventW
StartServiceCtrlDispatcherW
CoUninitialize
CoInitialize
SHGetFolderPathW
CommandLineToArgvW
PathFileExistsW
PathRemoveFileSpecW
PathCombineW
GetProcessImageFileNameW
EnumProcesses
DestroyEnvironmentBlock
CreateEnvironmentBlock
WTSQueryUserToken
ObtainUserAgentString
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpWriteData
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ