Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
edbf9344fc7ed6872914fd85bdf5c068f4acbfa4968b1cad2a7dc78035df7d43.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
edbf9344fc7ed6872914fd85bdf5c068f4acbfa4968b1cad2a7dc78035df7d43.exe
Resource
win10v2004-20220812-en
Target
edbf9344fc7ed6872914fd85bdf5c068f4acbfa4968b1cad2a7dc78035df7d43
Size
973KB
MD5
1355443caa3e3c3b44399f3b15979f90
SHA1
6059c650df168295b5cb32ec68f3ee6d9c1baa3c
SHA256
edbf9344fc7ed6872914fd85bdf5c068f4acbfa4968b1cad2a7dc78035df7d43
SHA512
228a82577382a3c7e14b0f5b469d5ab7d513cae46a99b81bfc51faa7b6cbf3f8374c4c2a914253ca1ceef8e722faaa7a9cf83f6fa3372e08667edc47279b5f4e
SSDEEP
12288:saHJzOgCJnruPhT+stojK9SeHhx5RA9nk9BwFQYmA9DNOtbyUUe:saHJzfqnCPJ+Ihx5RA9kcyY19SU
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
ntohl
timeGetTime
UrlCanonicalizeW
SHStrDupW
GetSidSubAuthority
GetSidSubAuthorityCount
RegEnumValueA
SystemFunction036
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
ConvertSidToStringSidW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegLoadKeyW
RegUnLoadKeyW
GetUserNameW
RegQueryValueExW
RegSetValueExW
GetFileSecurityW
SetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegOpenKeyExW
RegCloseKey
CreateProcessAsUserW
GetTokenInformation
EnumSystemLocalesW
HeapSize
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetACP
GetOEMCP
GetTimeZoneInformation
WriteConsoleW
ReadConsoleW
OutputDebugStringW
GetDriveTypeW
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcess
GetModuleFileNameW
ExpandEnvironmentStringsW
CloseHandle
QueueUserAPC
TerminateProcess
ResumeThread
CreateProcessW
SetPriorityClass
GetPriorityClass
VirtualAllocEx
WriteProcessMemory
GetModuleHandleW
WaitForSingleObject
OpenProcess
GetFileInformationByHandle
GetExitCodeProcess
GetDateFormatW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
LockResource
SizeofResource
FindResourceW
CreateFileW
ReadFile
SetFilePointer
SetFileTime
WriteFile
VerSetConditionMask
GetShortPathNameW
VerifyVersionInfoW
GetFileAttributesW
GetFileAttributesExW
MoveFileExW
DuplicateHandle
GetCurrentThreadId
RemoveDirectoryW
GetSystemTimeAsFileTime
LocalFree
WTSGetActiveConsoleSessionId
LoadLibraryExW
CreateMutexW
GetTickCount
FormatMessageA
SetLastError
OutputDebugStringA
ReleaseMutex
DeleteFileW
GetCurrentProcessId
GetTempFileNameW
MapViewOfFile
UnmapViewOfFile
CreateDirectoryW
CopyFileW
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
SetEnvironmentVariableA
CreateFileMappingW
SetCurrentDirectoryW
SetFileAttributesW
IsDebuggerPresent
GetNativeSystemInfo
GetVersionExW
GetCommandLineW
GetModuleHandleA
GetUserDefaultLangID
AssignProcessToJobObject
GetStdHandle
GetEnvironmentVariableW
FindFirstFileW
FindFirstFileExW
FindClose
FindNextFileW
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetFileSizeEx
SetEnvironmentVariableW
QueryPerformanceCounter
FileTimeToSystemTime
QueryPerformanceFrequency
RtlCaptureStackBackTrace
GetLocaleInfoW
Sleep
CreateThread
LeaveCriticalSection
EnterCriticalSection
GetProcessId
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleHandleExW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetEvent
ResetEvent
WaitForMultipleObjects
RtlCaptureContext
SetUnhandledExceptionFilter
InitializeCriticalSection
ReleaseSemaphore
VirtualQueryEx
CreateSemaphoreW
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
GetStartupInfoW
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
PeekNamedPipe
FileTimeToLocalFileTime
HeapReAlloc
GetProcessHeap
HeapAlloc
ExitProcess
GetFileType
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
HeapFree
IsProcessorFeaturePresent
GetStringTypeW
MultiByteToWideChar
EncodePointer
WideCharToMultiByte
LoadLibraryExA
GetUserDefaultUILanguage
PropVariantClear
CoSetProxyBlanket
CoCreateInstance
CLSIDFromString
CoCreateGuid
CoUninitialize
CoInitializeEx
StringFromGUID2
CoTaskMemFree
SysFreeString
VariantInit
SysStringLen
SysAllocString
VariantClear
MonitorFromWindow
SetForegroundWindow
MoveWindow
DestroyWindow
CreateWindowExW
GetWindowThreadProcessId
FindWindowW
IsWindow
SendMessageTimeoutW
MessageBoxW
CharUpperW
LoadIconW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
SetWindowLongW
GetWindowLongW
SendMessageW
GetMonitorInfoW
CreateURLMonikerEx
WTSQueryUserToken
DestroyEnvironmentBlock
CreateEnvironmentBlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE