Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
143cec97d6dcd71b635bcf1f502554ce6f088400c7df4e0f56e474a7f47079b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
143cec97d6dcd71b635bcf1f502554ce6f088400c7df4e0f56e474a7f47079b6.exe
Resource
win10v2004-20220901-en
Target
143cec97d6dcd71b635bcf1f502554ce6f088400c7df4e0f56e474a7f47079b6
Size
1.1MB
MD5
e15bedee5ba2c2091ba88ccd7136e07d
SHA1
a06ba9b42f491067cb65d78ff9091bdde5cf9115
SHA256
143cec97d6dcd71b635bcf1f502554ce6f088400c7df4e0f56e474a7f47079b6
SHA512
e86bb75aa8f747a4840fdcb8f14f2e19a74bf8e99191756f354bc69016482c1f3e5e152cd12f52bd725e7b174a26a237e4adabf9ca660c14a0d1366bf577cb97
SSDEEP
24576:0F8h6Mq6+WW7QznmyFQjpNPUhZNjZBXrP3I2Iv+nVdC:/gMqw8QrmyFEqZ5r423dC
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
RegQueryValueExW
DuplicateTokenEx
RegOpenKeyExW
CheckTokenMembership
FreeSid
OpenProcessToken
AllocateAndInitializeSid
RegCloseKey
CreateProcessAsUserW
RegDeleteValueW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
GetTokenInformation
ConvertSidToStringSidW
AdjustTokenPrivileges
LookupPrivilegeValueW
SystemFunction036
RegDisablePredefinedCache
RevertToSelf
GetLengthSid
SetKernelObjectSecurity
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetKernelObjectSecurity
SetSecurityInfo
ConvertStringSidToSidW
SetTokenInformation
GetAce
GetSecurityDescriptorSacl
SetThreadToken
DuplicateToken
CreateRestrictedToken
EqualSid
CopySid
CreateWellKnownSid
GetSecurityInfo
SetEntriesInAclW
RegQueryValueExA
VirtualProtect
GetModuleFileNameW
CreateFileW
GetLastError
CloseHandle
GetFileSize
GetModuleHandleW
GetCurrentProcess
GetVersionExW
GetCurrentThread
LoadLibraryW
VirtualQuery
TerminateProcess
WaitForSingleObject
GetSystemDirectoryW
OpenProcess
CreateEventW
Sleep
SetEvent
CreateThread
HeapSetInformation
ReplaceFileW
GetCurrentProcessId
FreeLibrary
WritePrivateProfileStringW
SetLastError
GetPrivateProfileIntW
ProcessIdToSessionId
SetCurrentDirectoryW
WTSGetActiveConsoleSessionId
CreateProcessW
LoadLibraryExW
VirtualFree
VirtualAlloc
SetFilePointer
GetSystemInfo
GetFileAttributesW
GetSystemTime
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleExW
lstrcmpiW
DuplicateHandle
GetExitCodeProcess
SetEnvironmentVariableW
SetInformationJobObject
SetHandleInformation
GetStdHandle
AssignProcessToJobObject
GetProcessId
ResumeThread
GetCommandLineW
LocalFree
GetModuleHandleA
GetNativeSystemInfo
ExpandEnvironmentStringsW
GetUserDefaultLangID
WriteFile
GetLocalTime
GetCurrentDirectoryW
CreateDirectoryW
QueryDosDeviceW
GetLongPathNameW
GetTempPathW
UnmapViewOfFile
SetFileAttributesW
GetFileAttributesExW
DeleteFileW
CopyFileW
CreateFileMappingW
MapViewOfFile
lstrlenW
SetThreadPriority
ReadFile
QueryPerformanceFrequency
GetThreadPriority
SystemTimeToFileTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapCreate
HeapDestroy
FormatMessageA
GetTickCount
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
DeleteCriticalSection
ReadProcessMemory
EnterCriticalSection
LeaveCriticalSection
GetUserDefaultLCID
GetProcAddress
SetFilePointerEx
FlushFileBuffers
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
GetCurrentThreadId
GetProcessTimes
HeapFree
InitializeCriticalSection
HeapSize
WritePrivateProfileStructW
HeapReAlloc
HeapAlloc
GetProcessHeap
GlobalMemoryStatusEx
DebugBreak
SetUnhandledExceptionFilter
FindFirstFileExW
FindNextFileW
FindClose
GetWindowsDirectoryW
RegisterWaitForSingleObject
UnregisterWaitEx
SizeofResource
LockResource
LoadResource
FindResourceW
IsDebuggerPresent
DeviceIoControl
TlsGetValue
lstrcmpA
lstrcmpiA
TlsSetValue
TlsAlloc
ResetEvent
TlsFree
TryEnterCriticalSection
RtlCaptureStackBackTrace
VirtualQueryEx
HeapLock
HeapWalk
HeapUnlock
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
CreateRemoteThread
GetLocaleInfoW
SuspendThread
GetThreadContext
FlushInstructionCache
SetThreadContext
OutputDebugStringW
VirtualAllocEx
TerminateJobObject
WriteProcessMemory
VirtualProtectEx
GetProcessHeaps
GetProcessHandleCount
SignalObjectAndWait
GetFileType
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
CreateMutexW
SearchPathW
LoadLibraryExA
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
ReadConsoleW
GetACP
GetFileSizeEx
GetEnvironmentVariableW
ExitProcess
GetConsoleMode
GetConsoleCP
FormatMessageW
GetStringTypeW
EncodePointer
CompareStringW
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
LocalFileTimeToFileTime
CreateFileA
ReleaseMutex
OpenThread
RtlUnwind
GetDriveTypeW
SetStdHandle
GetFullPathNameW
QueryWorkingSet
GetModuleInformation
GetProcessMemoryInfo
GetProcessImageFileNameW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Netbios
??0ShellResourceRequestDetails@@QAE@XZ
??1ShellResourceRequestDetails@@QAE@XZ
??4ShellResourceRequestDetails@@QAEAAU0@ABU0@@Z
GetHandleVerifier
GetUploadedReportsImpl
IsSandboxedProcess
get_launch_failed
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ