Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ab3c310a1b8bd6cf243cf99f318e6f95d81922f24bd35ccbb6d3a5612b823ee4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ab3c310a1b8bd6cf243cf99f318e6f95d81922f24bd35ccbb6d3a5612b823ee4.exe
Resource
win10v2004-20220812-en
Target
ab3c310a1b8bd6cf243cf99f318e6f95d81922f24bd35ccbb6d3a5612b823ee4
Size
1.8MB
MD5
850253d352ce509b7ef98172951d0f60
SHA1
36fb1fb21b50b4c5e894f258895bda2765164f14
SHA256
ab3c310a1b8bd6cf243cf99f318e6f95d81922f24bd35ccbb6d3a5612b823ee4
SHA512
0c5bac7047fe396fc6e7946b497b842819456c879e478a4973c6e0378738090efd5912faeb816acfbc335c723f4d3ccbac7fe48a2cf865ca13d9f76edfbd658c
SSDEEP
49152:0HY3RZxlpI06JeUrVTQCWnU/Kr2qI/kycvl:0HY3RzI06JxVT8U/dN/9a
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadResource
WideCharToMultiByte
SizeofResource
GetFileAttributesA
MultiByteToWideChar
LockResource
Process32First
OpenProcess
Process32Next
CreateToolhelp32Snapshot
LocalFree
SignalObjectAndWait
UnregisterWait
GetThreadPriority
GetTimeZoneInformation
RegisterWaitForSingleObject
FindResourceA
TerminateProcess
InterlockedDecrement
Sleep
ExitProcess
GetTempPathA
GetCurrentProcessId
GetVersionExA
CreateMutexA
GetTempFileNameA
GetVolumeInformationA
GetComputerNameA
DeleteFileA
CloseHandle
GetLocalTime
GetLastError
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
SetThreadPriority
CreateEventW
SetEvent
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
SwitchToThread
SetThreadAffinityMask
GetProcessAffinityMask
DeleteTimerQueueTimer
CreateDirectoryA
GetExitCodeProcess
GetTickCount
WaitForSingleObject
HeapFree
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapAlloc
GetCPInfo
ReadFile
GetConsoleMode
ReadConsoleW
SetFilePointer
WriteFile
GetConsoleCP
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetProcessHeap
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
SetFilePointerEx
FlushFileBuffers
HeapSize
SetLastError
InterlockedIncrement
GetCurrentThread
GetCurrentThreadId
GetModuleFileNameW
RaiseException
IsValidCodePage
GetACP
GetOEMCP
GetStringTypeW
CreateFileW
GetModuleHandleW
SetStdHandle
WriteConsoleW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreW
RtlUnwind
HeapReAlloc
InterlockedExchange
FreeLibrary
LoadLibraryExW
OutputDebugStringW
LoadLibraryW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetEndOfFile
DuplicateHandle
GetExitCodeThread
lstrlenA
CreateTimerQueue
CreateTimerQueueTimer
ExitThread
CreateThread
SetEnvironmentVariableA
EnumWindows
IsWindow
GetWindowThreadProcessId
IsWindowVisible
GetClassNameA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
FreeSid
AllocateAndInitializeSid
RegQueryValueA
LookupAccountSidA
EqualSid
GetTokenInformation
ConvertSidToStringSidA
OpenProcessToken
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
ShellExecuteW
SHFileOperationA
SHGetFolderPathA
ShellExecuteExA
CoSetProxyBlanket
CoInitializeEx
CoCreateInstance
CoInitializeSecurity
CoUninitialize
SysAllocString
VariantClear
VariantInit
SysFreeString
StrStrIA
PathFileExistsA
wnsprintfA
InternetCloseHandle
InternetReadFile
InternetOpenA
InternetOpenUrlA
ord22
ord20
ord23
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ