Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
ae0f19f02b94bfb03a41d1d82b0b4fdf27c21ac5c9ae6e1c0020d0a0c45d9751.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ae0f19f02b94bfb03a41d1d82b0b4fdf27c21ac5c9ae6e1c0020d0a0c45d9751.exe
Resource
win10v2004-20220812-en
Target
ae0f19f02b94bfb03a41d1d82b0b4fdf27c21ac5c9ae6e1c0020d0a0c45d9751
Size
378KB
MD5
b889f6106073adaa8bd7e666de48795b
SHA1
8eb5b4d61d528553aadae1eca96d3397effef137
SHA256
ae0f19f02b94bfb03a41d1d82b0b4fdf27c21ac5c9ae6e1c0020d0a0c45d9751
SHA512
744506de694d03458e7ebd8090692dd849e2c806cd92c7a3b2e5503eca864ad233212d3425584ef5c448e89d80684438d7a05384d92cd312e8c0433dbfe2c0f9
SSDEEP
6144:n6fI3iW8/u2kHdkOqPxBk4JRTptu3EVTW:n0WJdn4JRT/qE
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OleUninitialize
OleInitialize
SetWindowLongA
UnregisterClassA
DestroyWindow
GetSystemMetrics
CharNextA
ReleaseDC
GetDC
SendMessageA
RegisterWindowMessageA
FindWindowA
GetWindowThreadProcessId
GetClassInfoExA
RegisterClassExA
CreateWindowExA
GetWindowLongA
DefWindowProcA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
CreateMutexA
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InitializeCriticalSection
WaitForSingleObject
CloseHandle
ReleaseMutex
lstrlenA
MultiByteToWideChar
GlobalMemoryStatus
OpenProcess
VirtualQuery
GetThreadContext
WriteFile
GetCommandLineW
TerminateThread
IsBadReadPtr
VirtualProtect
IsBadWritePtr
GetCurrentDirectoryA
SetCurrentDirectoryA
SetErrorMode
SetFilePointer
LocalAlloc
GetVersion
GetSystemInfo
MoveFileA
CreateDirectoryA
GetFileAttributesA
CreateFileA
DeleteFileA
GetVersionExA
LoadLibraryA
FreeLibrary
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
LocalFree
GetModuleHandleA
GetProcAddress
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
RaiseException
GetEnvironmentVariableA
GetModuleFileNameA
SetEnvironmentVariableA
CreateThread
Sleep
InterlockedExchange
SHGetFolderPathA
SHGetFolderPathW
CommandLineToArgvW
strchr
printf
_putenv
_crt_debugger_hook
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
malloc
memcpy
wcsnlen
memset
_recalloc
calloc
free
memmove_s
_purecall
memcpy_s
strncpy
strrchr
??3@YAXPAX@Z
asctime
vsprintf
_time32
_gmtime32
strnlen
atoi
wcsstr
realloc
sprintf
_vsnprintf
memmove
??2@YAPAXI@Z
strstr
strtol
??_U@YAPAXI@Z
??_V@YAXPAX@Z
getenv
_stricmp
LookupPrivilegeValueA
AdjustTokenPrivileges
CreateWellKnownSid
GetNamedSecurityInfoW
SetEntriesInAclA
AllocateAndInitializeSid
OpenProcessToken
RegEnumKeyExA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyA
RegSetValueA
RegQueryValueA
RegDeleteValueA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegSetValueExA
SetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
FreeSid
SetNamedSecurityInfoW
PathAddBackslashA
PathAppendA
PathStripToRootW
PathFindNextComponentW
GetFileVersionInfoA
VerQueryValueA
GetDeviceCaps
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE