Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b431c4ff7107736ae54b1493450574991eef0fcd7877a9d7b84ccb41ecf135fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b431c4ff7107736ae54b1493450574991eef0fcd7877a9d7b84ccb41ecf135fb.exe
Resource
win10v2004-20220812-en
Target
b431c4ff7107736ae54b1493450574991eef0fcd7877a9d7b84ccb41ecf135fb
Size
428KB
MD5
82f6b7a3e3bed4e18f83b1f5f6d50c60
SHA1
04ec209870051ac54fc0e8fefc89248399b700f7
SHA256
b431c4ff7107736ae54b1493450574991eef0fcd7877a9d7b84ccb41ecf135fb
SHA512
2e97bed8484ba863b64758617a8c557ab0494e250e2a9b5150b60da6a787e0251c7a06206bf81ba71208669bcdbf9d7060015933363ea3b934213f0c16164f5c
SSDEEP
6144:9qEGLYSXdqse2B2AUe5T+4nmIi0pvT/0TBIJsB+P90hh7KD0B:sEnKrUe5T+umutT/0T2Jsi0r
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FtpPutFileA
FtpSetCurrentDirectoryA
InternetOpenA
InternetCloseHandle
InternetOpenUrlW
InternetSetOptionA
InternetGetConnectedState
InternetConnectA
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
GetModuleHandleW
GetPrivateProfileStringW
GetPrivateProfileIntA
InitializeCriticalSectionAndSpinCount
SizeofResource
Sleep
LeaveCriticalSection
GetModuleFileNameW
MultiByteToWideChar
lstrlenW
WritePrivateProfileStringW
FlushInstructionCache
RaiseException
SetThreadLocale
GetLastError
SetLastError
GetThreadLocale
GetProcAddress
EnterCriticalSection
lstrcmpiW
DeleteCriticalSection
GetCurrentThreadId
CloseHandle
DeleteFileA
ReadFile
LoadLibraryW
GetPrivateProfileStringA
LoadLibraryExW
GetModuleFileNameA
ExpandEnvironmentStringsW
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetFilePointer
GetConsoleMode
GetConsoleCP
GetCurrentProcessId
GetTickCount
GetFileSize
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
HeapReAlloc
HeapSize
IsProcessorFeaturePresent
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetLocaleInfoW
InterlockedExchange
RtlUnwind
FatalAppExitA
GetFileType
SetHandleCount
LoadResource
FreeLibrary
GetSystemTime
FindResourceW
CreateFileA
EnumSystemLocalesA
IsValidCodePage
IsValidLocale
InterlockedCompareExchange
InterlockedPushEntrySList
VirtualFree
VirtualAlloc
InterlockedPopEntrySList
GetStdHandle
WriteFile
HeapDestroy
HeapCreate
SetConsoleCtrlHandler
IsDebuggerPresent
SetUnhandledExceptionFilter
GetLocaleInfoA
GetUserDefaultLCID
CreateFileW
GetProcessHeap
SetEndOfFile
GetStringTypeW
LCMapStringW
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
GetCommandLineA
EncodePointer
DecodePointer
ExitProcess
HeapAlloc
HeapFree
InitializeCriticalSection
QueryPerformanceCounter
WriteConsoleW
SetStdHandle
DestroyWindow
GetWindowRect
GetMessageW
PostQuitMessage
UnregisterClassA
LoadImageW
GetParent
GetClientRect
TranslateMessage
IsDialogMessageW
LoadIconW
GetWindowLongW
PeekMessageW
MonitorFromWindow
GetDlgItem
SetWindowLongW
SetWindowPos
ShowWindow
CreateDialogParamW
GetSystemMetrics
SendMessageW
MapWindowPoints
GetMonitorInfoW
DefWindowProcW
GetWindow
DispatchMessageW
CharNextW
CreateFontW
GetStockObject
DeleteObject
RegDeleteKeyW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
SHGetFolderPathW
ShellExecuteW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
ord51
ShellExecuteA
CoCreateInstance
CoUninitialize
CoTaskMemRealloc
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
SysFreeString
VarUI4FromStr
PathFindFileNameA
PathIsRelativeW
PathRemoveFileSpecW
PathRemoveFileSpecA
PathAppendW
PathRemoveBackslashW
PathFileExistsW
InitCommonControlsEx
UrlMkGetSessionOption
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE