Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
a07d0a47c1f211e944b45233840c6cb38ff0006eb71d9185b97601bfe82617d2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a07d0a47c1f211e944b45233840c6cb38ff0006eb71d9185b97601bfe82617d2.exe
Resource
win10v2004-20221111-en
Target
a07d0a47c1f211e944b45233840c6cb38ff0006eb71d9185b97601bfe82617d2
Size
130KB
MD5
5c98a00a52537caeed5a71027c5b6f88
SHA1
b2f6a6cb5394f44a04e2d3d2ef9ec94be84d6460
SHA256
a07d0a47c1f211e944b45233840c6cb38ff0006eb71d9185b97601bfe82617d2
SHA512
14496839c1976be3ade2d05b7c35bb82dd54dc6d4425da85d08721d4f6d57263f7c3c6c31ecae79ed10a24d02edac0630ec731a2e6456d5840d2eab995e02623
SSDEEP
3072:FtRx0BQ5KGxaus0uTND/uPH5IpBzpqlPTFHS2N:NoQ5KC8TND/uv5cePTFy2N
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetComputerNameA
FindResourceA
VirtualAlloc
lstrcpyA
SetPriorityClass
GetAtomNameA
GlobalGetAtomNameW
OpenEventW
LocalAlloc
GetExpandedNameW
SetParent
RemoveMenu
wvsprintfW
MessageBoxW
GetDesktopWindow
MoveWindow
InvalidateRgn
ClientToScreen
GetSysColor
SetCapture
CopyRect
RegisterWindowMessageW
GetMenuItemRect
ActivateKeyboardLayout
GetMessageA
CharPrevA
GetDlgItemInt
RegisterClassExA
GetDC
WaitForInputIdle
WaitMessage
SetCursorPos
CharUpperA
LoadCursorW
GetClientRect
FillRect
CreateDesktopA
SetDlgItemInt
GetClassLongA
RegisterClassA
GetClassInfoA
SetWindowTextA
GetMenuItemInfoW
FrameRect
GetKeyState
MonitorFromRect
GetWindowDC
GetDlgItemTextA
GetCharABCWidthsW
GetWorldTransform
CreateBitmapIndirect
SetBkMode
CreateRoundRectRgn
SetTextColor
EnumFontFamiliesA
SetPolyFillMode
SetWorldTransform
RegQueryValueExW
AddAuditAccessAceEx
AddAce
RegEnumKeyW
RegDeleteValueA
StrCmpNIA
StrStrA
ExtractIconExW
StrRChrIW
ExtractIconExA
SHGetFolderLocation
ExtractIconEx
PathMakeSystemFolderA
SHAutoComplete
SHDeleteOrphanKeyA
UrlIsNoHistoryW
SHRegEnumUSValueA
wvnsprintfW
PathAddBackslashW
PathCompactPathExA
StrToInt64ExA
PageSetupDlgA
WSAGetLastError
getprotobyname
getsockname
WSACleanup
gethostname
WSASend
WSAIoctl
WSACloseEvent
select
InternetSetCookieExA
InternetGetLastResponseInfoA
DeleteUrlCacheContainerW
SetUrlCacheEntryInfoA
UpdateUrlCacheContentPath
GetUrlCacheHeaderData
HttpSendRequestW
FindFirstUrlCacheEntryExA
InternetOpenW
InternetClearAllPerSiteCookieDecisions
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ