Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
122.exe
Resource
win10-20230220-en
Target
122.exe
Size
531KB
MD5
649647dbdf024f1c565f380777c0c65e
SHA1
542e79418f5cfee03323b1aaff9b83423a20e310
SHA256
010e32be0f86545e116a8bc3381a8428933eb8789f32c261c81fd5e7857d4a77
SHA512
2c3aea68fe5df96b927b15c930852cfc937f53499459da1f05b4e7e8544be29ffa54bccf6a6cd0810405a81bcb32adb13fa79c2863c75d214d3e3cf39203baec
SSDEEP
6144:tbJd2M19DXgLkpPGFeGw0wqii8dYa5wsXW46usMbvu2eTiI5Ac3A9W2w0wZuYJv/:BL2IzYkpOQOa5956uPvs5Q8v/
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
EnumProcessModules
GetModuleBaseNameW
DebugActiveProcessStop
FindResourceW
LoadResource
CreateProcessW
GetCurrentProcess
InitializeCriticalSection
OpenProcess
SizeofResource
GetExitCodeProcess
GetFileAttributesW
GetLastError
LockResource
CreateEventW
ContinueDebugEvent
WaitForDebugEvent
DeleteFileW
ResumeThread
CreateThread
ExpandEnvironmentStringsW
FormatMessageW
MultiByteToWideChar
TerminateProcess
SetConsoleCtrlHandler
GetFullPathNameW
SystemTimeToTzSpecificLocalTime
GetEnvironmentVariableA
GetCurrentDirectoryW
Process32FirstW
GetSystemInfo
WaitForMultipleObjects
Process32NextW
IsDebuggerPresent
DebugActiveProcess
DebugBreak
GetSystemTime
ExitProcess
GetDateFormatW
SetFilePointerEx
GetTimeFormatW
CreateFileW
ReleaseSemaphore
GetFileSizeEx
CreateSemaphoreW
GetProcessId
SetLastError
DeviceIoControl
VirtualQueryEx
WriteConsoleW
SetStdHandle
HeapReAlloc
OutputDebugStringW
LoadLibraryExW
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
OpenThread
ReadConsoleW
ReadProcessMemory
GetTickCount
GetThreadContext
DeleteCriticalSection
Sleep
WaitForSingleObject
CloseHandle
EnterCriticalSection
LeaveCriticalSection
SetEvent
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
GetVersionExW
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryW
GetModuleHandleW
GetCommandLineW
SetEndOfFile
ReadFile
CreateToolhelp32Snapshot
QueryPerformanceCounter
GetFileType
FlushFileBuffers
GetStringTypeW
GetConsoleMode
GetConsoleCP
RtlUnwind
HeapSize
RaiseException
GetStartupInfoW
TlsFree
TlsSetValue
HeapFree
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
GetProcessHeap
GetModuleHandleExW
WideCharToMultiByte
GetStdHandle
WriteFile
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
SendMessageW
GetDlgItem
InflateRect
LoadCursorW
DialogBoxIndirectParamW
SetWindowTextW
EndDialog
GetSysColorBrush
wsprintfW
IsHungAppWindow
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
LoadStringA
SetCursor
EndPage
StartPage
GetDeviceCaps
SetMapMode
EndDoc
StartDocW
PrintDlgW
RegOpenKeyW
EnumServicesStatusExW
OpenSCManagerW
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegCreateKeyW
CommandLineToArgvW
CoUninitialize
CoInitialize
CoAllowSetForegroundWindow
CoCreateInstance
CLSIDFromString
PdhOpenQueryW
PdhAddCounterW
PdhCollectQueryData
PdhGetFormattedCounterValue
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ