Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
74120aefe9c8a14de3dc62be2b3e8741b4f3448c0ca110ac645b5e57938860ab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74120aefe9c8a14de3dc62be2b3e8741b4f3448c0ca110ac645b5e57938860ab.exe
Resource
win10v2004-20220812-en
Target
74120aefe9c8a14de3dc62be2b3e8741b4f3448c0ca110ac645b5e57938860ab
Size
1.3MB
MD5
1941e2f676cc458c577e052d8bee8736
SHA1
0d09c1aaf17fa6d82d34e8c28342f0de2dffc65f
SHA256
74120aefe9c8a14de3dc62be2b3e8741b4f3448c0ca110ac645b5e57938860ab
SHA512
00641ff27a2100f70387cd4cce5ce8f915e8f1d1caf3f1e57adb8963c1fd7a1459c9dd9716449ce684492f1981e97991f86f1842d631fe592246fb862099e59a
SSDEEP
24576:/hKwCdDOwv1yDqDOPgC4wO2Ub7AcGYGI67GmnKPmqfdG4:Z8dDOwv1yDqDOPg9wO2UbUx7GmnKPxx
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathRemoveFileSpecW
PathFileExistsW
DuplicateHandle
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceW
GetFileTime
CreateFileW
GetSystemTimeAsFileTime
LocalFree
WTSGetActiveConsoleSessionId
VirtualFree
SetFilePointer
ReadFile
FreeLibrary
VirtualAlloc
SystemTimeToFileTime
QueryPerformanceCounter
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
GetUserDefaultLangID
CreateMutexW
GetTickCount
FormatMessageA
WriteFile
SetLastError
ReleaseMutex
GetCurrentProcessId
CreateEventW
ExpandEnvironmentStringsW
InterlockedExchange
SetEnvironmentVariableW
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
IsDebuggerPresent
GetNativeSystemInfo
GetVersionExW
SetEndOfFile
FlushFileBuffers
SetInformationJobObject
SetHandleInformation
VirtualQueryEx
OpenProcess
AssignProcessToJobObject
GetStdHandle
GetProcessId
HeapSetInformation
ResumeThread
LocalAlloc
MapViewOfFile
UnmapViewOfFile
GetTempPathW
GetFileAttributesW
GetCurrentDirectoryW
GetLongPathNameW
CreateFileMappingW
QueryDosDeviceW
GetLocaleInfoW
GetUserDefaultUILanguage
RaiseException
GetCurrentThreadId
CreateThread
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InterlockedExchangeAdd
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
RtlCaptureStackBackTrace
GetSystemDirectoryW
GetWindowsDirectoryW
RegisterWaitForSingleObject
UnregisterWaitEx
GetModuleHandleExW
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
InterlockedIncrement
SetEvent
ResetEvent
WaitForMultipleObjects
ReleaseSemaphore
InterlockedDecrement
RtlCaptureContext
CreateSemaphoreW
InitializeCriticalSection
GetThreadContext
SuspendThread
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
TerminateJobObject
SignalObjectAndWait
GetProcessHandleCount
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
ReadProcessMemory
GetThreadLocale
GetACP
LoadLibraryA
CreateFileA
GetTimeZoneInformation
GetStringTypeW
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
HeapReAlloc
HeapAlloc
GetProcessHeap
LCMapStringW
GetCPInfo
RtlUnwind
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapSize
GetOEMCP
IsValidCodePage
WriteConsoleW
SetStdHandle
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
GetLastError
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
CreateRemoteThread
GetSystemInfo
VirtualQuery
GetModuleHandleA
SetCurrentDirectoryW
LoadLibraryExW
GetModuleFileNameW
GetEnvironmentVariableW
GetEnvironmentVariableA
GetCommandLineW
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
CreateDesktopW
SetProcessWindowStation
GetThreadDesktop
GetUserObjectInformationW
GetProcessWindowStation
CharUpperW
CreateWindowStationW
CloseDesktop
CloseWindowStation
MessageBoxW
GetProfileType
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSQueryUserToken
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
timeGetTime
SetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorW
GetFileSecurityW
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
CreateProcessAsUserW
GetTraceEnableFlags
GetTraceLoggerHandle
RegSetValueExW
TraceEvent
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
SetThreadToken
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
RevertToSelf
RegDisablePredefinedCache
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine2
SetExperimentList3
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ