Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Target
DARKSOULS.exe
Size
296KB
MD5
c6e94b6541c8e502811351774dd40d75
SHA1
cbb68c4391df1bed0ad948c7fcc56357d0d454a2
SHA256
21a783c6c67934aa14548c5955cf7e1df5b2fe7ce386af0d71a936b174148cf7
SHA512
797a7a64e4a1d230e264a519599278907e62f9d64d805b3495e2733fdc5d4ab1dc2d3439e1b9540961e7d82d7d0d23d5478cf9acd5aa501a1fe8bbf731c66549
SSDEEP
6144:nwoLkHAk558QfDUKZbEYthu2XyrqPQQ/73VaxDtw1is19Lm:nwo4HAk55JgWDthu2XyS/7ViDS31Zm
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WaitForMultipleObjects
LocalFree
LocalAlloc
GetCurrentProcess
CompareFileTime
GetProcessTimes
OpenProcess
Process32NextW
Process32FirstW
GetCurrentProcessId
CreateToolhelp32Snapshot
SetNamedPipeHandleState
CreateFileW
CreateNamedPipeW
DeleteCriticalSection
EnterCriticalSection
CancelIo
InitializeCriticalSection
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetStringTypeW
GetStringTypeA
GetOverlappedResult
WriteFile
ReadFile
ConnectNamedPipe
CreateProcessW
WaitForSingleObject
SetEvent
CloseHandle
CreateThread
GetLastError
CreateEventW
LeaveCriticalSection
SetLastError
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapFree
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapAlloc
RaiseException
HeapSize
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
LoadLibraryA
InitializeCriticalSectionAndSpinCount
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
FlushFileBuffers
LCMapStringA
LCMapStringW
DefWindowProcW
PostQuitMessage
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
PostMessageW
CryptGenRandom
CryptReleaseContext
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
OpenProcessToken
GetTokenInformation
GetLengthSid
CopySid
CryptAcquireContextW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ