Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
12252e9347efa79237a312a8f02acd37080ce3480d4d4a86062db29f935e8fb0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12252e9347efa79237a312a8f02acd37080ce3480d4d4a86062db29f935e8fb0.exe
Resource
win10v2004-20220812-en
Target
12252e9347efa79237a312a8f02acd37080ce3480d4d4a86062db29f935e8fb0
Size
299KB
MD5
0d6d71644f073b04696466e01b2ee71c
SHA1
df915a682c98ee4cf5637a31d10811ff6f50ff26
SHA256
12252e9347efa79237a312a8f02acd37080ce3480d4d4a86062db29f935e8fb0
SHA512
52c2e2a321c5870a2d6232e062f0121f200da34734ad3afdc29ee696950a689492bbd2324332600b7f0813ce09f7efde6e460c8a0e7f13534e3468780b1eb6e7
SSDEEP
3072:9oz5YYvbGDo2+Sz/B2JHZZTFMpVtkLiltUn73Ju/t3xRT5hYZ4z1sxtbjIUWnoRF:+zYDjZ9W1MVNg4dcZ4zytbLF
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
GetSystemDirectoryA
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessA
GetModuleFileNameA
GetFullPathNameA
GetSystemDefaultLCID
GetVersionExA
CreateFileA
GetLocaleInfoW
GetTimeZoneInformation
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSection
InterlockedExchange
SetConsoleCtrlHandler
IsValidCodePage
GetFileAttributesA
LocalAlloc
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
Sleep
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapReAlloc
VirtualAlloc
EnterCriticalSection
FatalAppExitA
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GlobalAlloc
GlobalFree
lstrcmpA
lstrcpynA
IsDBCSLeadByte
SetLastError
CreateMutexA
GetCurrentProcess
lstrcmpiA
LocalReAlloc
GetLastError
GetPrivateProfileIntA
GetPrivateProfileStringA
lstrlenA
_lopen
IsValidLocale
_llseek
SetEnvironmentVariableA
_lread
LocalFree
_lclose
MulDiv
FreeLibrary
LoadLibraryA
GetProcAddress
FlushFileBuffers
CompareStringA
CompareStringW
EnumSystemLocalesA
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
RtlUnwind
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
RaiseException
GetCPInfo
GetACP
GetOEMCP
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
IsDlgButtonChecked
EnableWindow
SetWindowPos
MessageBoxA
UnregisterClassA
DestroyWindow
ShowWindow
InvalidateRect
UpdateWindow
SetForegroundWindow
CreateWindowExA
SetWindowLongA
LoadCursorA
RegisterClassA
GetSystemMetrics
GetWindowLongA
BeginPaint
GetWindowRect
GetSysColor
SendMessageA
EndPaint
DefWindowProcA
DialogBoxParamA
SetWindowTextA
SetFocus
SendDlgItemMessageA
LoadIconA
GetDC
ReleaseDC
GetClientRect
LoadBitmapA
LoadStringA
EndDialog
GetDlgItem
TextOutA
CreateFontIndirectA
GetDeviceCaps
CreateCompatibleBitmap
SetStretchBltMode
BitBlt
CreateCompatibleDC
SelectObject
StretchBlt
DeleteDC
GetObjectA
SetBkMode
SetTextColor
GetStockObject
DeleteObject
GetTextExtentPoint32A
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
EqualSid
FreeSid
RegOpenKeyExA
RegQueryValueExA
ShellExecuteExA
CoInitialize
CoUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ