Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
c8bdc4200c515e0d4faf368abd8596c5ff3206ddda8a72c57383a518858e9edfN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c8bdc4200c515e0d4faf368abd8596c5ff3206ddda8a72c57383a518858e9edfN.exe
Resource
win10v2004-20241007-en
Target
c8bdc4200c515e0d4faf368abd8596c5ff3206ddda8a72c57383a518858e9edfN.exe
Size
217KB
MD5
53f5de90c854efd0eb5bcf07d20d60c0
SHA1
a8ad649f0e46eec9dbcfb9fbf2aa6244919c35a6
SHA256
c8bdc4200c515e0d4faf368abd8596c5ff3206ddda8a72c57383a518858e9edf
SHA512
baba1b8e6ab1ff3425780f95aaa6c00e821fdc6212b70b1882253e832cdbbb5ac6acf3492ea4d8ad30b27ea947614a720c972865af4946466a30bfc5b21cf292
SSDEEP
6144:NrRaTyDOnlo7eM+mlkWgRXOqobzWjozm2ulYM6Y:9sTbzu1glovW4EH6Y
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetVersion
lstrlenW
SetLocaleInfoA
GetNumberFormatA
OpenEventW
WaitForMultipleObjects
SetCalendarInfoA
lstrcmpiA
EnumTimeFormatsA
GetLocaleInfoA
FreeResource
lstrcatA
DisconnectNamedPipe
LoadLibraryA
GetCurrentDirectoryW
lstrlenA
SetPriorityClass
GetCurrentThreadId
GetSystemDirectoryW
RemoveDirectoryW
GetTempFileNameW
GetModuleFileNameA
lstrcmpA
SetComputerNameW
GetLocalTime
IsDebuggerPresent
CreateThread
GetDateFormatW
GetFileAttributesA
IsBadReadPtr
BeginUpdateResourceA
GetCalendarInfoW
GetCommandLineW
FileTimeToSystemTime
OpenSemaphoreW
MoveFileW
GetProcAddress
QueryPerformanceCounter
SuspendThread
GetACP
lstrcpynA
GetStartupInfoW
DeleteMenu
DefWindowProcW
SendMessageA
DestroyCursor
GetDlgItemTextW
FillRect
GetActiveWindow
CreateDialogParamW
GetSubMenu
LoadCursorA
GetWindowLongA
GetTopWindow
wsprintfW
GetCharABCWidthsW
CreateICA
EndPage
ExcludeClipRect
GetGlyphOutlineW
OffsetClipRgn
UpdateColors
Pie
GetObjectW
GetMetaFileBitsEx
OffsetViewportOrgEx
GetEnhMetaFileDescriptionA
InvertRgn
SetMapperFlags
GetTextExtentExPointI
CreateDCA
GetBkMode
GetEnhMetaFileA
GetCharABCWidthsA
RegOpenKeyA
RegCreateKeyExA
RegCreateKeyExW
RegReplaceKeyW
RegSaveKeyA
DuplicateIcon
StrChrW
SHGetDiskFreeSpaceExW
SHGetDataFromIDListW
StrRChrIW
PathIsPrefixA
PathIsRootW
StrCmpLogicalW
SHEnumValueW
PathParseIconLocationW
PathIsUNCServerShareW
StrCmpIW
PathFindSuffixArrayA
StrStrNW
StrToIntW
EnumProtocolsW
SetServiceW
WSAAsyncGetProtoByNumber
connect
WSAAsyncGetHostByAddr
I_CryptFindLruEntryData
CertDeleteCTLFromStore
CertEnumCRLContextProperties
CryptDecodeMessage
CertNameToStrW
CertFindCRLInStore
CertRemoveEnhancedKeyUsageIdentifier
I_CryptCreateLruEntry
CertGetCRLFromStore
CertEnumCRLsInStore
CertNameToStrA
CertSetEnhancedKeyUsage
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ