Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
c43043e3e05e847e53230186d2b88ee6508021badb2eeba0d27c39b4385b8fef.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c43043e3e05e847e53230186d2b88ee6508021badb2eeba0d27c39b4385b8fef.exe
Resource
win10v2004-20220812-en
Target
c43043e3e05e847e53230186d2b88ee6508021badb2eeba0d27c39b4385b8fef
Size
712KB
MD5
3eb1d29141562dc9d7664011be41d740
SHA1
132ae5a7ec09ad418e92be54bc6592f43cdd0da2
SHA256
c43043e3e05e847e53230186d2b88ee6508021badb2eeba0d27c39b4385b8fef
SHA512
1091719386c3e7ded78869dfd321d944befb39cd613cf692cf77f9aab69ac4e34587dc7f21aa77983d9517e99ce1176404b02779ce0bcda058b52923d904a45b
SSDEEP
12288:EX719x4IzzEHHszVjGNZMgGw7Bz8/kUz6KscVUEj4zNoPgJprPdfRp:Ejx4Izy1Gw98/kPKscVUEjCNFVfRp
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PGO_AtlDebugInterface
?GetService@Com@Util@@YGJABU_GUID@@PAPAX@Z
?RegObject@Com@Util@@YGJABU_GUID@@0PA_W1@Z
?RegService@Com@Util@@YGJABU_GUID@@0PA_W1@Z
GetLogController
EnumProcessModules
EnumProcesses
GetModuleFileNameExW
timeGetTime
PathRemoveFileSpecW
PathFileExistsW
SHGetValueW
PathAppendW
SHGetValueA
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
GetPrivateProfileStringW
ExitProcess
CreateMutexW
ReleaseMutex
HeapAlloc
GetProcessHeap
HeapFree
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCommandLineW
SetUnhandledExceptionFilter
GetLocalTime
CreateToolhelp32Snapshot
Thread32First
OpenThread
SuspendThread
ResumeThread
Thread32Next
VirtualQuery
IsBadWritePtr
LoadLibraryW
Sleep
GetModuleHandleA
TerminateProcess
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
TlsGetValue
HeapSetInformation
HeapCreate
HeapReAlloc
HeapSize
UnhandledExceptionFilter
EncodePointer
DecodePointer
GetStartupInfoW
TlsSetValue
VirtualAlloc
GetEnvironmentVariableA
InitializeCriticalSectionAndSpinCount
VirtualFree
GetSystemInfo
TlsAlloc
InterlockedExchange
InterlockedCompareExchange
SwitchToThread
VirtualProtect
GetVersionExW
Module32Next
Module32First
IsProcessorFeaturePresent
WriteFile
GetStdHandle
GetLocaleInfoW
GetTickCount
SetFilePointer
CreateFileW
OutputDebugStringA
FormatMessageA
DeleteCriticalSection
EnterCriticalSection
InterlockedExchangeAdd
VirtualAllocEx
VirtualQueryEx
GetStringTypeW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsFree
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetEnvironmentVariableA
RtlUnwind
lstrlenW
CreateThread
FreeLibrary
GetNativeSystemInfo
WriteProcessMemory
VirtualProtectEx
HeapDestroy
GetLongPathNameW
SetInformationJobObject
PostQueuedCompletionStatus
TerminateJobObject
SetEvent
UnregisterWaitEx
GetQueuedCompletionStatus
ResetEvent
CreateEventW
CreateIoCompletionPort
RegisterWaitForSingleObject
DuplicateHandle
GetProcessId
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
CompareStringW
GetTimeZoneInformation
GetModuleHandleExW
FlushFileBuffers
SignalObjectAndWait
SetHandleInformation
GetProcessHandleCount
GetThreadContext
AssignProcessToJobObject
GetExitCodeProcess
ReadFile
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
GetCurrentDirectoryW
DebugBreak
ReadProcessMemory
OpenProcess
GetCurrentProcess
GetCurrentProcessId
CloseHandle
CreateProcessW
SetLastError
GetModuleHandleW
GetProcAddress
QueryPerformanceFrequency
QueryPerformanceCounter
MultiByteToWideChar
GetLastError
GetFileAttributesW
GetModuleFileNameW
LocalFree
RaiseException
GetCurrentThreadId
IsDebuggerPresent
QueryDosDeviceW
CreateWindowStationW
CloseWindowStation
DestroyWindow
CreateWindowExW
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CloseDesktop
OpenInputDesktop
SendMessageW
IsWindow
MessageBoxW
FindWindowExW
AllowSetForegroundWindow
wsprintfW
GetThreadDesktop
GetUserObjectInformationW
OpenWindowStationA
RegCloseKey
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
GetTokenInformation
CreateProcessAsUserW
SetThreadToken
OpenProcessToken
RegQueryValueExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
RegCreateKeyExW
RegDisablePredefinedCache
RevertToSelf
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
RegOpenKeyExW
CommandLineToArgvW
CoUninitialize
OleInitialize
CoInitialize
OleUninitialize
SysAllocStringLen
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE