Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
35dec156c830659d6b88ccd70472d70b33367f380932a1c114affb6b512b86c9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
35dec156c830659d6b88ccd70472d70b33367f380932a1c114affb6b512b86c9.exe
Resource
win10v2004-20220812-en
Target
35dec156c830659d6b88ccd70472d70b33367f380932a1c114affb6b512b86c9
Size
295KB
MD5
a22c56a6249e0c6bee668d4fdcefe020
SHA1
5e79d64decc466bae95336fa804663d08e7395f1
SHA256
35dec156c830659d6b88ccd70472d70b33367f380932a1c114affb6b512b86c9
SHA512
f9067f45794ebed91980c2c63344061cd2c5c45b8c522a0e0fc30e8a5fadaf20d4c747e2868c41b3a92e90c8913e57e9434672865e633ac1c950d1e3e571b9f4
SSDEEP
6144:xM7Php5YFF81or5m0JSFCfyM13PynhTUWOQKMd:xM7QF81o9nJtyW/8UtQKa
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RtlUpcaseUnicodeChar
NtDeleteFile
NtQueueApcThread
ZwQueueApcThread
RtlAdjustPrivilege
NtQuerySymbolicLinkObject
NtQuerySemaphore
ZwQueryInformationThread
NtResumeThread
RtlFreeUnicodeString
ZwWriteVirtualMemory
ZwQuerySystemInformation
ZwClose
LoadLibraryW
LockFile
FindFirstFileExA
FindFirstChangeNotificationW
GetStartupInfoW
GetCurrentProcessId
HeapReAlloc
GlobalFindAtomW
ProcessIdToSessionId
SetDefaultCommConfigW
CreateWaitableTimerA
GlobalUnWire
Beep
DebugBreak
GetModuleFileNameW
CreateEventA
SetProcessAffinityMask
FatalAppExitA
WriteConsoleOutputCharacterA
GetVolumeInformationA
GetEnvironmentStrings
SetTapeParameters
FindFirstVolumeW
lstrcmpA
GetCommModemStatus
GetCalendarInfoA
EnumResourceLanguagesW
GetPrivateProfileSectionA
WritePrivateProfileSectionA
WaitForDebugEvent
FillConsoleOutputCharacterA
GetThreadSelectorEntry
GetStringTypeExA
CreateRemoteThread
WriteConsoleOutputAttribute
GetProcessHeap
GetPrivateProfileStructW
GetDiskFreeSpaceW
GetCurrencyFormatA
GetPrivateProfileStructW
GlobalAddAtomW
LookupPrivilegeValueW
RegEnumKeyA
OpenEventLogA
AccessCheckByTypeAndAuditAlarmW
GetSecurityDescriptorGroup
ObjectOpenAuditAlarmA
ObjectDeleteAuditAlarmW
QueryServiceStatus
SetFileSecurityA
RegLoadKeyA
GetSecurityDescriptorControl
AreAnyAccessesGranted
CryptGetProvParam
CreateProcessAsUserA
GetTextCharset
StgCreateDocfile
HACCEL_UserMarshal
StgCreatePropStg
CoCreateFreeThreadedMarshaler
CreateGenericComposite
GetRunningObjectTable
MonikerCommonPrefixWith
OleBuildVersion
CoCreateGuid
CoRegisterPSClsid
CoRegisterMallocSpy
CoSetCancelObject
HWND_UserSize
ReadClassStm
CoGetCancelObject
CreateBindCtx
HACCEL_UserSize
CoGetCallerTID
HBITMAP_UserSize
CoWaitForMultipleHandles
CLSIDFromProgID
CoRevertToSelf
OleCreateLinkEx
ReadFmtUserTypeStg
CoFreeUnusedLibrariesEx
WriteClassStm
HICON_UserUnmarshal
CoGetMarshalSizeMax
CLIPFORMAT_UserUnmarshal
HBITMAP_UserUnmarshal
CoQueryProxyBlanket
WNetCancelConnection2W
WNetGetResourceInformationA
WNetGetNetworkInformationW
WNetConnectionDialog
WNetUseConnectionA
WNetOpenEnumW
WNetDisconnectDialog
WNetCancelConnection2A
WNetAddConnection2W
WNetCancelConnectionW
WNetGetUserA
WNetGetResourceParentW
WNetGetUniversalNameA
WNetConnectionDialog1W
WNetGetUserW
WNetDisconnectDialog1A
WNetGetConnectionA
WNetAddConnectionW
MultinetGetConnectionPerformanceW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ