Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ab112aef3104cfbc4391b6acd574f0cc994a964311ec40cfa6bbda3520ee923a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab112aef3104cfbc4391b6acd574f0cc994a964311ec40cfa6bbda3520ee923a.exe
Resource
win10v2004-20220812-en
Target
ab112aef3104cfbc4391b6acd574f0cc994a964311ec40cfa6bbda3520ee923a
Size
1.8MB
MD5
1c1e233c3c257ac1d31fdcc74d068470
SHA1
db3f98076748ee5186a2818bc431550096837532
SHA256
ab112aef3104cfbc4391b6acd574f0cc994a964311ec40cfa6bbda3520ee923a
SHA512
edd1216d07f8c2f24c51cc45126319bed5b3bc9cb6515a4c8d3dd921243b6b798b97e1856d516d4b46b463def45b38f42a63c0bdaa7b05a06358aa13d3026ef5
SSDEEP
49152:WHY3RILlpI06JeUrVTQCWnU/Kr2qI/kycvn:WHY3RwI06JxVT8U/dN/9g
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadResource
WideCharToMultiByte
SizeofResource
GetFileAttributesA
MultiByteToWideChar
LockResource
Process32First
OpenProcess
Process32Next
CreateToolhelp32Snapshot
LocalFree
SignalObjectAndWait
UnregisterWait
GetThreadPriority
GetTimeZoneInformation
RegisterWaitForSingleObject
FindResourceA
TerminateProcess
InterlockedDecrement
Sleep
ExitProcess
GetTempPathA
GetCurrentProcessId
GetVersionExA
CreateMutexA
GetTempFileNameA
GetVolumeInformationA
GetComputerNameA
DeleteFileA
CloseHandle
GetLocalTime
GetLastError
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
SetThreadPriority
CreateEventW
SetEvent
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
SwitchToThread
SetThreadAffinityMask
GetProcessAffinityMask
DeleteTimerQueueTimer
CreateDirectoryA
GetExitCodeProcess
GetTickCount
WaitForSingleObject
HeapFree
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapAlloc
GetCPInfo
ReadFile
GetConsoleMode
ReadConsoleW
SetFilePointer
WriteFile
GetConsoleCP
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetProcessHeap
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
SetFilePointerEx
FlushFileBuffers
HeapSize
SetLastError
InterlockedIncrement
GetCurrentThread
GetCurrentThreadId
GetModuleFileNameW
RaiseException
IsValidCodePage
GetACP
GetOEMCP
GetStringTypeW
CreateFileW
GetModuleHandleW
SetStdHandle
WriteConsoleW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreW
RtlUnwind
HeapReAlloc
InterlockedExchange
FreeLibrary
LoadLibraryExW
OutputDebugStringW
LoadLibraryW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetEndOfFile
DuplicateHandle
GetExitCodeThread
lstrlenA
CreateTimerQueue
CreateTimerQueueTimer
ExitThread
CreateThread
SetEnvironmentVariableA
EnumWindows
IsWindow
GetWindowThreadProcessId
IsWindowVisible
GetClassNameA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
FreeSid
AllocateAndInitializeSid
RegQueryValueA
LookupAccountSidA
EqualSid
GetTokenInformation
ConvertSidToStringSidA
OpenProcessToken
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
ShellExecuteW
SHFileOperationA
SHGetFolderPathA
ShellExecuteExA
CoSetProxyBlanket
CoInitializeEx
CoCreateInstance
CoInitializeSecurity
CoUninitialize
SysAllocString
VariantClear
VariantInit
SysFreeString
StrStrIA
PathFileExistsA
wnsprintfA
InternetCloseHandle
InternetReadFile
InternetOpenA
InternetOpenUrlA
ord22
ord20
ord23
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ