Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
9a5780127cb7adca2ae69d4d5ad1b3cd1338d2c98057add8642058295e714215.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9a5780127cb7adca2ae69d4d5ad1b3cd1338d2c98057add8642058295e714215.exe
Resource
win10v2004-20220812-en
Target
9a5780127cb7adca2ae69d4d5ad1b3cd1338d2c98057add8642058295e714215
Size
1.4MB
MD5
a0f274abfeffd7307f09c1db37c599ef
SHA1
bd61b8359e378601be38556e8a421c03ab458774
SHA256
9a5780127cb7adca2ae69d4d5ad1b3cd1338d2c98057add8642058295e714215
SHA512
892c4325ef5d962582664fa2102c284cd546fddba188218abb0347edd50a8a093dd96d590d6671ae89556541a6d8d0d9da4d79509de8e2197bcab30691bb3cef
SSDEEP
24576:TsKwj4jv42g/zdXuk+dPk4YMsWEb+Y8HQoOa3XTtPoE1iRVOApWZVJ:TsKwjgeduk+dPk4xESFHQotnTtPNMRT6
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetUserDefaultUILanguage
GetThreadLocale
ExpandEnvironmentStringsW
ResumeThread
WriteProcessMemory
GetFileInformationByHandle
VirtualAllocEx
QueueUserAPC
TerminateProcess
GetModuleHandleW
CreateProcessW
OpenProcess
WaitForSingleObject
CloseHandle
GetModuleFileNameW
GetCurrentProcess
GetProcAddress
LoadLibraryW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
GetCommandLineW
LocalFree
CreateMutexW
SetFilePointer
GetTickCount
FormatMessageA
WriteFile
CreateFileW
SetLastError
GetModuleHandleA
GetCurrentThreadId
OutputDebugStringA
ReleaseMutex
DeleteFileW
GetCurrentProcessId
GetTempFileNameW
GetFileSize
FindFirstFileW
LoadLibraryExW
MoveFileExW
CreateDirectoryW
VirtualFree
CopyFileW
GetFileAttributesW
FileTimeToSystemTime
ReadFile
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
VirtualAlloc
FindClose
RemoveDirectoryW
FindNextFileW
GetFileTime
GetFileAttributesExW
FileTimeToLocalFileTime
GetNativeSystemInfo
InterlockedCompareExchange
GetVersionExW
GetUserDefaultLangID
SetUnhandledExceptionFilter
FreeLibrary
GetSystemTimeAsFileTime
GetExitCodeProcess
GetStdHandle
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
DuplicateHandle
QueryPerformanceCounter
SetEndOfFile
SetFilePointerEx
SetFileTime
FlushFileBuffers
GetEnvironmentVariableW
SetEnvironmentVariableW
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
IsDebuggerPresent
GetSystemDirectoryW
GetWindowsDirectoryW
Sleep
RaiseException
CreateThread
RtlCaptureStackBackTrace
WideCharToMultiByte
MultiByteToWideChar
VirtualQuery
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
ReleaseSemaphore
CreateSemaphoreW
SetEvent
WaitNamedPipeW
TransactNamedPipe
ResetEvent
SetNamedPipeHandleState
WaitForMultipleObjects
GetDateFormatW
GetShortPathNameW
FindResourceW
LoadResource
SizeofResource
LockResource
WTSGetActiveConsoleSessionId
InterlockedExchange
UnhandledExceptionFilter
HeapFree
GetStartupInfoW
PeekNamedPipe
GetFileType
HeapAlloc
GetConsoleCP
GetConsoleMode
GetProcessHeap
SetStdHandle
HeapReAlloc
ExitProcess
GetCPInfo
RtlUnwind
LCMapStringA
LCMapStringW
GetModuleFileNameA
HeapCreate
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
CreateFileA
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
LoadLibraryA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLastError
CallNextHookEx
CharUpperW
MessageBoxW
GetWindowThreadProcessId
FindWindowExW
FindWindowW
SendMessageTimeoutW
IsWindow
GetWindowLongW
SetWindowLongW
SetWindowsHookExW
UnhookWindowsHookEx
SendMessageW
LoadIconW
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
CreateProcessAsUserW
ConvertSidToStringSidW
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
RegEnumValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegSetValueExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTraceLoggerHandle
GetTraceEnableFlags
ConvertSecurityDescriptorToStringSecurityDescriptorW
SetFileSecurityW
GetFileSecurityW
GetUserNameW
LookupAccountSidW
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
ShellExecuteExW
ord680
ord59
SHGetFolderPathW
SHChangeNotify
SHFileOperationW
CommandLineToArgvW
CoUninitialize
CoInitializeEx
StringFromGUID2
CoSetProxyBlanket
CoCreateInstance
PropVariantClear
DestroyEnvironmentBlock
CreateEnvironmentBlock
SHStrDupW
SHDeleteKeyW
UrlCanonicalizeW
SHDeleteEmptyKeyW
CreateURLMoniker
WTSQueryUserToken
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
ntohl
timeGetTime
SysFreeString
SysAllocString
VariantClear
VariantInit
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ