Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Target
Size
376.8MB
MD5
c0aa10266f450abbe6d72ddb21465898
SHA1
dd88672d418a2278f91f3de61ac5be9086d19451
SHA256
40bf10da0f1a788ef8ce9eddf422c305c56b429b8b7811720261e8c091977a60
SHA512
9458b5a070d5ff8ae2598faa4084b36af3f416ab68e39360e7d461dc4d52bd244d5f84a5a50e4af807c33e486430d8d4679a08a603db7c89085898f1d88d280d
SSDEEP
6291456:67X5OoSodbPfQ19OUuXbUVg/jirRcbZK3vrGcdNn/kDvPTxxqI9PbChEZeyjrdWR:GX5OoSAz49LuLU8uSbZKfrGskrx0yb9g
Detects HTTP links in interactive objects within PDF files.
resource | yara_rule |
---|---|
static1/unpack001/23-SEPTEMBER-371-PCS-@CRIBCLOUDLOGS/23-SEPTEMBER-371-PCS-@CRIBCLOUDLOGS/HT[F186762AF2CFFAB847D0E2F50F835543] [2022-09-22T00_24_32.0705103]/FileGrabber/Users/GLOBA PRODUCTIONS/Desktop/PREMIERS PAS.docx33.pdf | pdf_with_link_action |
Detected embedded OLE objects in Office documents.
resource | yara_rule |
---|---|
sample | office_ole_embedded |
static1/unpack001/23-SEPTEMBER-371-PCS-@CRIBCLOUDLOGS/23-SEPTEMBER-371-PCS-@CRIBCLOUDLOGS/ID[B0D696B41E437CFCFF3E2F56F59CCC28] [2022-09-22T01_50_39.1269173]/FileGrabber/Users/Muhammad Ibnu/Desktop/TESIS FULL TINGKAT ADOPSI (110822).docx | office_ole_embedded |
static1/unpack001/23-SEPTEMBER-371-PCS-@CRIBCLOUDLOGS/23-SEPTEMBER-371-PCS-@CRIBCLOUDLOGS/MZ[83658B40E3D1BA194CC5FC0AEE27C764] [2022-09-21T23_45_17.8978904]/FileGrabber/Users/Amilcar/Documents/Relatório Anual 2011 Janeiro.docx | office_ole_embedded |
static1/unpack001/23-SEPTEMBER-371-PCS-@CRIBCLOUDLOGS/23-SEPTEMBER-371-PCS-@CRIBCLOUDLOGS/TR[7CD702E57976E6512C0C96E834091A74] [2022-09-22T01_18_53.5229226]/FileGrabber/Users/hazir/Documents/RHO 1 studentscopy 21-22.docx.aabn | office_ole_embedded |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
SHStrDupW
GetOpenFileNameW
GetSaveFileNameW
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptVerifySignatureW
RegCloseKey
RegCreateKeyExW
InitCommonControlsEx
InternetOpenW
InternetCloseHandle
InternetOpenUrlW
InternetReadFileExW
InternetSetStatusCallbackW
HttpQueryInfoW
CryptImportPublicKeyInfo
CertFreeCertificateContext
CertCreateCertificateContext
GlobalReAlloc
GlobalSize
GlobalLock
GlobalUnlock
GlobalFree
GetTempFileNameW
GetTempPathW
Sleep
LoadResource
LockResource
SizeofResource
FindResourceW
FreeLibrary
LoadLibraryW
GetTimeZoneInformation
OutputDebugStringW
OutputDebugStringA
SetConsoleCtrlHandler
GetProcessHeap
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FindClose
GetFileAttributesExW
FlushFileBuffers
SetStdHandle
MoveFileExW
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
ReadFile
EnumSystemLocalesW
GetUserDefaultLCID
GlobalAlloc
GetTimeFormatW
GetDateFormatW
GetFileType
GetCurrentThread
HeapReAlloc
HeapFree
HeapAlloc
GetACP
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
ExitThread
CreateThread
InterlockedFlushSList
InterlockedPushEntrySList
LoadLibraryExW
RtlUnwindEx
RtlPcToFileHeader
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTickCount
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
DecodePointer
EncodePointer
FormatMessageW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
MultiByteToWideChar
QueryFullProcessImageNameA
OpenProcess
DeleteCriticalSection
LoadLibraryExA
RaiseException
GetFileAttributesW
GetEnvironmentVariableW
MulDiv
WideCharToMultiByte
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
GetLastError
CloseHandle
WriteFile
DeleteFileW
CreateFileW
WriteConsoleW
HeapSize
VirtualQuery
VirtualProtect
GetSystemInfo
SetEndOfFile
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
IsValidLocale
DestroyWindow
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
EndDialog
DialogBoxParamW
CreateDialogParamW
CreateWindowExW
KillTimer
SetTimer
SetMenuDefaultItem
CheckMenuItem
IsClipboardFormatAvailable
EmptyClipboard
RegisterClipboardFormatW
GetClipboardData
SetClipboardData
GetClipboardOwner
CloseClipboard
OpenClipboard
LoadBitmapW
GetMenuItemInfoW
TrackPopupMenu
ModifyMenuW
GetMenuItemCount
GetMenuItemID
GetSubMenu
DestroyMenu
GetMenuState
GetMenuStringW
LoadMenuW
GetSystemMetrics
IsDialogMessageW
LoadIconW
FindWindowW
GetCursorPos
MessageBeep
MessageBoxA
SetForegroundWindow
UpdateWindow
GetMenuDefaultItem
BringWindowToTop
IsWindow
RegisterClassExW
PostQuitMessage
PostThreadMessageW
PostMessageW
DispatchMessageW
TranslateMessage
GetMessageW
RegisterWindowMessageW
GetSysColor
SetCursor
SetFocus
AppendMenuW
GetSystemMenu
EnableWindow
GetFocus
GetDlgCtrlID
GetGUIThreadInfo
LoadStringW
GetDesktopWindow
IntersectRect
ScreenToClient
GetWindowRect
SetWindowTextW
IsWindowVisible
SetWindowPos
ShowWindow
MessageBoxW
DestroyIcon
SetWindowLongPtrW
GetWindowLongPtrW
GetWindowLongW
InflateRect
DrawFocusRect
GetClientRect
GetWindowTextW
InvalidateRect
DrawStateW
CallWindowProcW
DefWindowProcW
DrawFrameControl
LoadImageW
DestroyCursor
GetWindow
GetTopWindow
ReleaseDC
GetDC
SendDlgItemMessageW
GetDlgItem
SendMessageW
GetWindowThreadProcessId
GetClassNameA
GetForegroundWindow
MapVirtualKeyA
SendInput
keybd_event
ToAsciiEx
LoadKeyboardLayoutA
ActivateKeyboardLayout
GetKeyboardLayout
GetMessageA
DispatchMessageA
GetMessageExtraInfo
PostMessageA
GetKeyState
GetKeyboardState
GetStockObject
SetTextColor
EnumFontFamiliesExW
ExtTextOutW
SelectObject
Rectangle
GetTextExtentPoint32W
DeleteObject
SetBkColor
GetDeviceCaps
DeleteDC
CreateCompatibleDC
BitBlt
GetObjectW
SetBkMode
CreateSolidBrush
CreateFontIndirectW
SetCurrentProcessExplicitAppUserModelID
ShellExecuteW
Shell_NotifyIconW
PropVariantClear
CoInitialize
CoCreateInstance
ImmCreateContext
ImmReleaseContext
ImmAssociateContext
ImmSetCompositionStringW
ImmGetContext
ImmSetOpenStatus
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ