Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
e97a069a2ca8b86b10894eaad203fc2d57e9dcfe7db0a20b9ca09fcb64dcd391.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e97a069a2ca8b86b10894eaad203fc2d57e9dcfe7db0a20b9ca09fcb64dcd391.exe
Resource
win10v2004-20220812-en
Target
e97a069a2ca8b86b10894eaad203fc2d57e9dcfe7db0a20b9ca09fcb64dcd391
Size
3.7MB
MD5
e0fc94cf8bac862abf26a51401df5512
SHA1
9ecfb0c9c4c36b595af4de13789d04632a1de179
SHA256
e97a069a2ca8b86b10894eaad203fc2d57e9dcfe7db0a20b9ca09fcb64dcd391
SHA512
96e6f7f76e8d3d6e1d95cda27c443b7d731f1bef0822e7a825c8cf4e6233ba02891b28c0a60b4443feca5b057fc40133e47ca8b58c0adc90e2a49e3a5bd8a881
SSDEEP
98304:1Y+y8UDASzt4GzSLeTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAE:uP8U9Jle9Tkb
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetErrorMode
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
HeapReAlloc
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetStdHandle
GetFileType
ExitProcess
HeapSize
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
InterlockedIncrement
VirtualFree
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetOEMCP
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentDirectoryA
GetDriveTypeA
CreateFileA
SetEnvironmentVariableA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
GetFileTime
GetFileAttributesW
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
LocalAlloc
InitializeCriticalSection
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
RaiseException
FormatMessageW
LocalFree
InterlockedDecrement
FindFirstFileW
FindNextFileW
FindClose
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GetModuleHandleA
GlobalFree
FreeResource
SetFilePointer
ReadFile
lstrlenA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileInformationByHandle
GetLocalTime
GetPrivateProfileIntW
WritePrivateProfileStringW
WinExec
lstrlenW
lstrcatW
MulDiv
GetVersionExW
GetCurrentProcess
SetPriorityClass
lstrcpyW
DeviceIoControl
GetModuleFileNameW
WriteFile
GetPrivateProfileStringW
CreateMutexW
MultiByteToWideChar
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
ResetEvent
GetACP
WaitForMultipleObjects
DeleteCriticalSection
FreeLibrary
GetTickCount
CreateDirectoryW
InitializeCriticalSectionAndSpinCount
TerminateThread
Sleep
GetExitCodeThread
CreateThread
GlobalUnlock
GlobalLock
GlobalAlloc
CloseHandle
GetFileSize
CreateFileW
DeleteFileW
RemoveDirectoryW
WaitForSingleObject
CreateEventW
SetEvent
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetLastError
SetLastError
FindResourceW
LoadResource
LockResource
HeapCreate
SizeofResource
PostThreadMessageW
TranslateMessage
ValidateRect
SetWindowContextHelpId
MapDialogRect
CharUpperW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetMenuState
DestroyMenu
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
RegisterClipboardFormatW
DefWindowProcW
CallWindowProcW
IntersectRect
SystemParametersInfoA
GetWindowPlacement
SetWindowPos
ShowWindow
MoveWindow
GetDlgCtrlID
IsDialogMessageW
SendDlgItemMessageW
GetDlgItemInt
GetWindowTextLengthW
GetWindowTextW
GetWindow
SetFocus
EndPaint
BeginPaint
ScreenToClient
GrayStringW
DrawTextExW
TabbedTextOutW
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
WindowFromPoint
GetWindowRgn
IsWindow
IsWindowVisible
DrawFocusRect
DrawTextW
GetKeyState
AppendMenuW
GetMenuItemID
GetMenuItemInfoW
GetSubMenu
GetMenuItemCount
OffsetRect
DrawIconEx
DrawEdge
SystemParametersInfoW
MessageBeep
LoadCursorW
SetCursor
InflateRect
GetWindowDC
GetSysColor
LoadImageW
GetWindowLongW
GetNextDlgGroupItem
CharNextW
InvalidateRgn
IsRectEmpty
SetWindowLongW
SetWindowRgn
SetWindowTextW
CopyAcceleratorTableW
UnregisterClassW
GetSysColorBrush
GetWindowThreadProcessId
GetMessageW
PostQuitMessage
MessageBoxW
GetClipboardData
SendMessageTimeoutW
PostMessageW
FindWindowW
GetParent
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetFocus
UpdateWindow
ReleaseDC
GetDC
EnableWindow
FillRect
CopyRect
LoadBitmapW
GetCursorPos
KillTimer
ReleaseCapture
SetTimer
PtInRect
GetWindowRect
SetCapture
ClientToScreen
SetForegroundWindow
CreatePopupMenu
DrawIcon
GetSystemMetrics
SendMessageW
IsIconic
InvalidateRect
GetClientRect
SetRect
LoadIconW
DestroyIcon
UnregisterClassA
RectVisible
TextOutW
ExtTextOutW
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
PtVisible
GetDeviceCaps
CreatePen
CreateRectRgnIndirect
GetMapMode
GetRgnBox
GetBkColor
GetClipBox
SetMapMode
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
GetObjectW
SetStretchBltMode
SetBkMode
RestoreDC
SaveDC
FrameRgn
FillRgn
PathToRegion
EndPath
Polygon
BeginPath
OffsetRgn
CreateRoundRectRgn
DeleteDC
SetTextColor
SetBkColor
CreateDIBitmap
PatBlt
CreateBitmap
GetTextColor
DeleteObject
Rectangle
SelectObject
CreateFontW
GetStockObject
SetPixel
GetNearestColor
CombineRgn
GetPixel
CreateRectRgn
GetTextExtentPoint32W
StretchBlt
CreateFontIndirectW
CreateSolidBrush
CreateCompatibleBitmap
BitBlt
CreateCompatibleDC
GetFileTitleW
OpenPrinterW
DocumentPropertiesW
ClosePrinter
RegSetValueExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegCreateKeyExW
RegOpenKeyW
RegQueryValueExW
RegCloseKey
ShellExecuteW
InitCommonControlsEx
_TrackMouseEvent
PathIsUNCW
PathFindExtensionW
UrlUnescapeW
PathFileExistsW
PathStripToRootW
PathFindFileNameW
OleUIBusyW
OleFlushClipboard
CoRevokeClassObject
OleIsCurrentClipboard
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRegisterMessageFilter
OleCreateFontIndirect
SafeArrayDestroy
SafeArrayCreate
SafeArrayGetElemsize
SafeArrayAccessData
SafeArrayUnaccessData
SystemTimeToVariantTime
VariantTimeToSystemTime
LoadRegTypeLi
DispCallFunc
VariantCopy
SysStringLen
VariantChangeType
SysAllocStringLen
SysAllocString
SysFreeString
OleCreatePictureIndirect
VariantClear
VariantInit
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
InternetCloseHandle
HttpOpenRequestW
InternetConnectW
FtpOpenFileW
HttpSendRequestW
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetGetLastResponseInfoW
HttpQueryInfoW
InternetQueryDataAvailable
InternetSetOptionExW
InternetCrackUrlW
InternetReadFile
InternetOpenUrlW
InternetCanonicalizeUrlW
InternetGetConnectedState
InternetOpenW
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ