Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3cd953d703def733b39d4213f919c58dfe8b9bb9d6aa69a0cb72fd41b0230a67.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3cd953d703def733b39d4213f919c58dfe8b9bb9d6aa69a0cb72fd41b0230a67.exe
Resource
win10v2004-20220901-en
Target
3cd953d703def733b39d4213f919c58dfe8b9bb9d6aa69a0cb72fd41b0230a67
Size
1.4MB
MD5
5f8c05bc933420259cc2d2beae309a93
SHA1
56976baf468224125ed994fe5f8e6a0d1929f663
SHA256
3cd953d703def733b39d4213f919c58dfe8b9bb9d6aa69a0cb72fd41b0230a67
SHA512
208a875a4b659b2366909156192820b99eefa4a0613658ada986403ba6391648f8746e9f8cb397a6800f98a1d6d38f6e36c13614e0ce5e38aa35a6c226da5ad7
SSDEEP
24576:rh/vx+FrjYJyNvshrN8UIoB6W0b2k48nL2E/N+7gYaOKNITxiSuLE1zr/Ki2R:rh/vx+rjsw0jIoB6W0b2k4VEs7gYqCTe
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetUserDefaultUILanguage
GetThreadLocale
OpenProcess
WaitForSingleObject
CloseHandle
GetModuleFileNameW
GetCurrentProcess
GetProcAddress
LoadLibraryW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
GetCommandLineW
LocalFree
CreateMutexW
SetFilePointer
CreateProcessW
GetTickCount
FormatMessageA
WriteFile
CreateFileW
SetLastError
GetModuleHandleA
GetCurrentThreadId
OutputDebugStringA
ReleaseMutex
DeleteFileW
GetCurrentProcessId
GetTempFileNameW
GetFileSize
FindFirstFileW
LoadLibraryExW
MoveFileExW
CreateDirectoryW
VirtualFree
CopyFileW
GetFileAttributesW
FileTimeToSystemTime
ReadFile
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
VirtualAlloc
FindClose
RemoveDirectoryW
FindNextFileW
GetFileTime
GetFileAttributesExW
FileTimeToLocalFileTime
GetModuleHandleW
GetVersionExW
GetUserDefaultLangID
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetExitCodeProcess
TerminateProcess
FreeLibrary
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
DuplicateHandle
QueryPerformanceCounter
InterlockedCompareExchange
ExpandEnvironmentStringsW
GetEnvironmentVariableW
SetEnvironmentVariableW
SetEndOfFile
SetFilePointerEx
SetFileTime
FlushFileBuffers
GetFileInformationByHandle
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
IsDebuggerPresent
InterlockedExchangeAdd
GetSystemDirectoryW
GetWindowsDirectoryW
RtlCaptureStackBackTrace
Sleep
RaiseException
CreateThread
WideCharToMultiByte
MultiByteToWideChar
VirtualQuery
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
ReleaseSemaphore
CreateSemaphoreW
SetEvent
WaitNamedPipeW
TransactNamedPipe
ResetEvent
SetNamedPipeHandleState
WaitForMultipleObjects
GetDateFormatW
GetShortPathNameW
FindResourceW
LoadResource
SizeofResource
LockResource
WTSGetActiveConsoleSessionId
InterlockedExchange
UnhandledExceptionFilter
HeapFree
GetStartupInfoW
PeekNamedPipe
GetFileType
HeapAlloc
GetConsoleCP
GetConsoleMode
GetProcessHeap
SetStdHandle
HeapReAlloc
ExitProcess
GetCPInfo
RtlUnwind
LCMapStringA
LCMapStringW
GetModuleFileNameA
HeapCreate
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
CreateFileA
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
LoadLibraryA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStdHandle
GetLastError
FindWindowW
SetWindowsHookExW
SendMessageTimeoutW
GetWindowLongW
IsWindow
SendMessageW
UnhookWindowsHookEx
SetWindowLongW
LoadIconW
CharUpperW
CallNextHookEx
wsprintfA
FindWindowExW
GetWindowThreadProcessId
MessageBoxW
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
CreateProcessAsUserW
ConvertSidToStringSidW
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
InitializeSecurityDescriptor
RegEnumValueW
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTraceLoggerHandle
GetTraceEnableFlags
RegOpenKeyExW
ConvertSecurityDescriptorToStringSecurityDescriptorW
SetFileSecurityW
GetFileSecurityW
GetUserNameW
LookupAccountSidW
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorDacl
RegSetValueExW
RegCloseKey
RegEnumKeyExW
SHFileOperationW
SHGetFolderPathW
ShellExecuteExW
SHChangeNotify
ord59
ord680
CommandLineToArgvW
PropVariantClear
CoInitializeEx
StringFromGUID2
CoSetProxyBlanket
CoUninitialize
CoCreateInstance
DestroyEnvironmentBlock
CreateEnvironmentBlock
timeGetTime
SHDeleteKeyW
UrlCanonicalizeW
SHDeleteEmptyKeyW
SHStrDupW
CreateURLMoniker
WTSQueryUserToken
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
ntohl
VariantClear
VariantInit
SysAllocString
SysFreeString
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ