Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
1a9d0450e06b1af4676902a30dad63de90466d656950852a16943e08df17fd4e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a9d0450e06b1af4676902a30dad63de90466d656950852a16943e08df17fd4e.exe
Resource
win10v2004-20220812-en
Target
1a9d0450e06b1af4676902a30dad63de90466d656950852a16943e08df17fd4e
Size
1.2MB
MD5
09471ac7e8087b59dded91f784638630
SHA1
caff35c08ad36582e8e3e1ce6dcbba04b4c61af6
SHA256
1a9d0450e06b1af4676902a30dad63de90466d656950852a16943e08df17fd4e
SHA512
5894b1730d30927b419ec621d9512d77aee93901018cd543c2f3898900254c2170d0154418ae0ed538912d27de8340fd15a15059f21b6f437819ff6c22582d30
SSDEEP
24576:TO7Nr4o3DN4yDH2zNPy9sQUD78EiVl+ojgdKPVpo:cr44DN4yWzFy9sQUDKVLjgdKP3o
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathRemoveFileSpecW
PathFileExistsW
WaitForSingleObject
PostQueuedCompletionStatus
SetLastError
GetLastError
InitializeCriticalSection
TerminateJobObject
GetCurrentThreadId
UnregisterWaitEx
SetEvent
GetQueuedCompletionStatus
ResetEvent
CreateThread
CreateEventW
CreateIoCompletionPort
DeleteCriticalSection
RegisterWaitForSingleObject
DuplicateHandle
GetProcessId
InterlockedExchange
SignalObjectAndWait
SetHandleInformation
GetProcessHandleCount
VirtualFree
LocalFree
ResumeThread
FreeLibrary
WriteProcessMemory
VirtualAllocEx
VirtualQueryEx
GetThreadContext
AssignProcessToJobObject
GetExitCodeProcess
MapViewOfFile
CreateFileMappingW
InterlockedIncrement
InterlockedDecrement
VirtualFreeEx
VirtualProtectEx
CreateFileW
GetLongPathNameW
GetFileAttributesW
QueryDosDeviceW
CreateJobObjectW
CreateMutexW
GetCurrentProcessId
CreateNamedPipeW
OpenEventW
OpenProcess
SearchPathW
GetCurrentDirectoryW
DebugBreak
lstrlenW
VirtualQuery
ReadProcessMemory
SuspendThread
ReleaseSemaphore
RtlCaptureContext
CreateSemaphoreW
WaitNamedPipeW
WaitForMultipleObjects
WriteFile
TransactNamedPipe
SetNamedPipeHandleState
ExpandEnvironmentStringsW
SetEnvironmentVariableW
GetUserDefaultLangID
SystemTimeToFileTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
SetFilePointer
FormatMessageA
ReleaseMutex
WideCharToMultiByte
MultiByteToWideChar
GetNativeSystemInfo
GetVersionExW
RaiseException
IsDebuggerPresent
SetInformationJobObject
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
ReadFile
GetStdHandle
GetSystemInfo
RtlCaptureStackBackTrace
VirtualAlloc
SizeofResource
LockResource
LoadResource
FindResourceW
GetFileTime
WTSGetActiveConsoleSessionId
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
LoadLibraryA
HeapAlloc
GetConsoleCP
GetConsoleMode
HeapReAlloc
SetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetCPInfo
RtlUnwind
GetStringTypeW
HeapCreate
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoA
GetStringTypeA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CreateFileA
CompareStringA
CompareStringW
UnmapViewOfFile
LeaveCriticalSection
EnterCriticalSection
GetTickCount
GetModuleHandleW
GetUserDefaultUILanguage
GetSystemDirectoryW
GetWindowsDirectoryW
SetEndOfFile
LocalAlloc
GetProcessHeap
GetThreadLocale
GetModuleHandleA
SetCurrentDirectoryW
LoadLibraryExW
GetEnvironmentVariableA
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
GetModuleFileNameW
GetTempPathW
GetEnvironmentVariableW
GetCommandLineW
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchangeAdd
GetUserObjectInformationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
CloseWindowStation
MessageBoxW
CharUpperW
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSQueryUserToken
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
timeGetTime
InitializeSecurityDescriptor
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
RegCreateKeyExW
OpenProcessToken
CreateProcessAsUserW
SetThreadToken
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegDisablePredefinedCache
RegOpenKeyExW
RegCloseKey
GetTokenInformation
LookupPrivilegeValueW
SetSecurityDescriptorDacl
CopySid
CreateWellKnownSid
GetSecurityInfo
SetEntriesInAclW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
ConvertSidToStringSidW
GetTraceEnableFlags
GetTraceLoggerHandle
TraceEvent
UnregisterTraceGuids
GetTraceEnableLevel
RegisterTraceGuidsW
SetFileSecurityW
ConvertSecurityDescriptorToStringSecurityDescriptorW
GetFileSecurityW
EqualSid
CrashForException
DumpProcess
DumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine
SetExperimentList
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE