Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
df8249ecaca794933b2c83add5a743cd157ac0fda29dd1f9bde33f6193dd006a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df8249ecaca794933b2c83add5a743cd157ac0fda29dd1f9bde33f6193dd006a.exe
Resource
win10v2004-20220812-en
Target
df8249ecaca794933b2c83add5a743cd157ac0fda29dd1f9bde33f6193dd006a
Size
129KB
MD5
e61c2a17550dc8c1a6da6817adc78789
SHA1
b9c69d966cc23bf46e16fbaafde75a643f942c67
SHA256
df8249ecaca794933b2c83add5a743cd157ac0fda29dd1f9bde33f6193dd006a
SHA512
cd6518827b5bd68647a60d305cdabfc736a9e58ebe4041ef392abf40260a20acaeea1ecaf59b61a0a6afbf4dc883374fd938f00b5e4784d0744c3907da0032b7
SSDEEP
1536:03B9etPP8x9DPmjWHPEkKXOcrvaLBEFzLTzWTMZ7zUgnuEUk:03DajoEkHcryLILTzWTg7zUguEP
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
OpenProcessToken
CloseHandle
CopyFileW
CreateEventA
CreateProcessW
CreateSemaphoreA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileW
FreeConsole
FreeLibrary
GetCommandLineA
GetCommandLineW
GetCurrentProcess
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetVersionExA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
MoveFileExA
ReadFile
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
_wgetenv
_winmajor
_wsplitpath
_wtoi64
_wunlink
abort
atexit
calloc
fputc
fputs
free
fwrite
malloc
memcpy
puts
realloc
signal
sprintf
strcat
strcmp
strcpy
strlen
vfprintf
wcscat
wcscpy
CommandLineToArgvW
FindExecutableA
EndDialog
GetWindowThreadProcessId
MoveWindow
SendMessageA
wsprintfW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE