Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
mxcrsc32.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
mxcrsc32.exe
Resource
win10v2004-20220901-en
Target
673864979f9a4db00ae149750ac1e8155ba285b9f6e04cf03e0c7eff7af929bb.zip
Size
202KB
MD5
5c4253006c42c5e64d8971acef26b70e
SHA1
12fb72292c5c6e2503a7d5f9a85d5c03b0dc667d
SHA256
a867583a5c0f86db4d0c861347fa3f406a3e8d62daf39664933d025e86f5fe3d
SHA512
494807d42ac3a04bcce22eb72cc21cd64615d389db3417b5c48d7761c33ace9d371139fa2de8537f3aa2623f3d4304c4f87e48749471d7b831a876140d004579
SSDEEP
6144:dcIfyElfMgeQNIvYK5kpCIFzszVN/ZWamVnfkyXF:mIaIfMgsvYPpCAY5zQnf/F
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReadFile
CreateFileMappingA
MapViewOfFile
GetFileSize
UnmapViewOfFile
GetModuleFileNameA
GetOverlappedResult
PeekNamedPipe
WriteFile
FlushFileBuffers
DisconnectNamedPipe
CreateNamedPipeA
ConnectNamedPipe
CreateSemaphoreA
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
SetEndOfFile
SetFilePointer
lstrlenA
OutputDebugStringA
HeapCreate
HeapDestroy
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetCurrentProcessId
GetCurrentThreadId
ResetEvent
GetFileTime
SetFileTime
GetTimeZoneInformation
GetTickCount
DeleteFileA
MoveFileA
GetProcessHeap
GetCurrentProcess
TerminateProcess
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateDirectoryA
Sleep
SetFileAttributesA
GetComputerNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
HeapSize
SetStdHandle
GetTimeFormatW
GetDateFormatW
HeapReAlloc
GetStdHandle
ExitProcess
GetFileType
CreateFileW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
LoadLibraryExW
SetEnvironmentVariableA
GetModuleFileNameW
RtlUnwind
GetCPInfo
GetStringTypeW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
EncodePointer
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
GetModuleHandleW
CreateEventW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
GetWindowsDirectoryA
FindClose
FindNextFileA
FindFirstFileA
GetSystemDirectoryA
GetComputerNameA
MultiByteToWideChar
GetVersionExA
WideCharToMultiByte
GetACP
GetDriveTypeA
FreeLibrary
LoadLibraryA
GetVersion
GetModuleHandleA
GetProcAddress
SetEvent
WaitForMultipleObjects
CreateEventA
WaitForSingleObject
DeviceIoControl
CloseHandle
CreateFileA
InitializeCriticalSection
DeleteCriticalSection
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
RemoveDirectoryA
UnhandledExceptionFilter
OutputDebugStringW
IsDebuggerPresent
GetCommandLineA
FindFirstFileExA
GetCommandLineW
SetCursor
MapVirtualKeyExA
LoadStringA
DefWindowProcA
PostQuitMessage
DestroyWindow
DispatchMessageA
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjects
CreateWindowExA
RegisterClassA
LoadCursorA
LoadIconA
GetForegroundWindow
MapVirtualKeyA
GetKeyboardLayout
EnumDisplaySettingsA
wsprintfA
wsprintfW
GetKeyNameTextA
GetStockObject
SystemFunction036
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
GetUserNameA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
CoCreateInstance
CoUninitialize
CoInitialize
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
VariantInit
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ