Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
aa91624045b4221b677e0450d3f84c6afe98b9d618fdb9edba62359a9fd2531f.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa91624045b4221b677e0450d3f84c6afe98b9d618fdb9edba62359a9fd2531f.exe
Resource
win10v2004-20240709-en
Target
aa91624045b4221b677e0450d3f84c6afe98b9d618fdb9edba62359a9fd2531f
Size
109KB
MD5
4b47a2432fbc42bb3febcdcdf79d2542
SHA1
1fdaa89f581c7c37738ab2fc66243b929c224c55
SHA256
aa91624045b4221b677e0450d3f84c6afe98b9d618fdb9edba62359a9fd2531f
SHA512
184a3564c623b9dac41325a7d710b586fc59172379e08b20ee56aaf02a74b724fc2c1015ca442db34109024e5f58c07131f5ac3084ce04ac1b6156c2bc6f2017
SSDEEP
1536:7RMAXf8zncn9wugA0ZH1e/4cHhDQAN9qTV5mpW0e0yalz4EBo8:2AXf8znpugJrcJN9qJ5dFNMz4EW8
ExtKeyUsageTimeStamping
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WaHostBootstrapper.pdb
RegisterEventSourceW
OpenProcessToken
GetTokenInformation
EventWrite
RegCreateKeyExW
CreateProcessAsUserW
DeregisterEventSource
EventRegister
ReportEventW
RegCloseKey
RegSetValueExW
LookupAccountSidW
LookupAccountNameW
AllocateLocallyUniqueId
AllocateAndInitializeSid
FreeSid
ConvertSidToStringSidW
CreateWellKnownSid
CryptGetHashParam
CryptAcquireContextW
CryptReleaseContext
RegDeleteKeyW
CryptCreateHash
ConvertStringSecurityDescriptorToSecurityDescriptorW
CryptDestroyHash
CryptHashData
CheckTokenMembership
EventUnregister
WaitForMultipleObjects
ResumeThread
FindFirstFileW
FreeLibrary
LoadLibraryW
GetProcAddress
FindClose
LocalFree
InitializeCriticalSection
OpenProcess
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetVersionExW
CopyFileW
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
DeviceIoControl
LocalAlloc
TlsFree
GetSystemTime
TlsAlloc
GetFileTime
AcquireSRWLockShared
InitializeSRWLock
MoveFileW
GetFileSizeEx
FlushFileBuffers
ReleaseSRWLockShared
TlsSetValue
AcquireSRWLockExclusive
OutputDebugStringW
ReleaseSRWLockExclusive
CompareFileTime
TlsGetValue
SetFilePointer
DeleteFileW
FindNextFileW
SetUnhandledExceptionFilter
Sleep
SetEnvironmentVariableW
GetCurrentProcess
ExpandEnvironmentStringsW
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
SetLastError
GetLastError
CreateFileW
GetProcessHeap
HeapFree
HeapAlloc
CreateDirectoryW
GetEnvironmentVariableW
GetModuleFileNameW
GetFileAttributesW
WriteFile
TerminateProcess
clock
_wcsicmp
memcpy
_exit
_vsnwprintf
_putws
wcsrchr
memmove
wcschr
__CxxFrameHandler3
_onexit
__dllonexit
_unlock
_lock
?terminate@@YAXXZ
_commode
_fmode
__C_specific_handler
_initterm
__setusermatherr
_cexit
memset
exit
__set_app_type
__wgetmainargs
_amsg_exit
_XcptFilter
_callnewh
malloc
free
RtlVirtualUnwind
NtQueryInformationProcess
RtlLookupFunctionEntry
RtlCaptureContext
RtlInitUnicodeString
RtlLengthRequiredSid
UuidCreate
NdrServerCall2
NdrServerCallAll
NdrClientCall3
RpcStringFreeW
RpcBindingFree
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcServerUseProtseqEpW
RpcServerRegisterIfEx
RpcServerInqCallAttributesW
CoInitializeEx
CoUninitialize
CoCreateInstance
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocString
ExpandEnvironmentStringsForUserW
CryptBinaryToStringW
RdGetLocalResource
RdCloseLocalResource
RdGetLocalResourceName
RdGetRuntimeExecutionEnvironment
RdGetConfigurationPath
RdRegisterCallback
RdGetSystemConfigurationSetting
RdUninitializeRuntime
RdGetApplicationConfigurationSetting
RdGetResourceRoot
RdInitializeRuntimeEx
LsaFreeReturnBuffer
CreateXmlReader
SHCreateStreamOnFileW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ