Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
03372899.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
03372899.exe
Resource
win10v2004-20230220-en
Target
03372899.exe
Size
1.9MB
MD5
a80ab5f7370f894610f9a361e73848fd
SHA1
53ab6f545c2c7a62bd6539b6ad24a1aa6458e235
SHA256
e2eb9cf30c364d3e2ed845654b36669f9f9adf71961e6d5a9fa5606b8d06e7b5
SHA512
6231667fada5e0b398f779adfb3d4d5a0f5de10bb2af95af45140b26bb3cfe76c5a906af47d70ae3f052da2e52b64bf82f17af48b56ff1469ec3675f4fa6f8f2
SSDEEP
49152:tpEVIMjg7llITAX591NZHmTvjpIHGAzl26y1CKiV/mhGG5:tpE/6WsPZGbWHE1CKhhGe
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameW
GetLastError
CreateFileMappingW
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetVersionExA
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
CreateEventW
GetStartupInfoW
MulDiv
SetEvent
InterlockedIncrement
InterlockedDecrement
CreateMutexW
WaitForSingleObject
ReleaseMutex
OpenFileMappingW
FreeLibrary
FindResourceW
LoadResource
LockResource
FreeResource
GetTempPathW
GetTempFileNameW
GetCurrentProcessId
SizeofResource
FormatMessageW
LocalFree
GetCommandLineW
ExitProcess
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLocalTime
InterlockedExchangeAdd
LocalAlloc
GetVersionExW
LoadLibraryW
GetFileInformationByHandle
GetLogicalDriveStringsW
GetVolumeInformationW
WriteFile
ReadFile
SetFilePointer
LockFile
LockFileEx
UnlockFile
UnlockFileEx
FlushFileBuffers
SetEndOfFile
SetFileValidData
SetErrorMode
SetLastError
SystemTimeToFileTime
FileTimeToSystemTime
CreateFileW
GetTickCount
Sleep
DeleteFileW
MoveFileW
CopyFileW
GetFileAttributesW
CreateDirectoryW
FindFirstFileW
FindClose
SetFileAttributesW
FindFirstFileExW
FindNextFileW
GetCurrentDirectoryW
GetFullPathNameW
GetDriveTypeW
FileTimeToLocalFileTime
HeapFree
GetProcessHeap
HeapAlloc
TlsSetValue
TlsGetValue
VirtualQuery
VirtualProtect
TlsAlloc
TlsFree
GetCurrentThreadId
GetPrivateProfileStringW
GetPrivateProfileIntW
WritePrivateProfileStringW
WideCharToMultiByte
CompareStringW
GetTimeZoneInformation
CreateSemaphoreW
ReleaseSemaphore
GetCurrentProcess
InterlockedExchange
ResumeThread
TerminateThread
CreateThread
GetProfileStringW
GetExitCodeProcess
GetSystemDefaultLangID
GetMailslotInfo
GetComputerNameW
ExpandEnvironmentStringsW
CreateMailslotW
CreateProcessW
RaiseException
GetSystemInfo
LoadLibraryExA
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
EncodePointer
RtlUnwind
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
GetModuleHandleExW
GetStdHandle
GetACP
LCMapStringW
GetStringTypeW
HeapReAlloc
SetStdHandle
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
HeapSize
GetConsoleCP
GetConsoleMode
SetFilePointerEx
DecodePointer
WriteConsoleW
CommandeComposante
DeclareProxy
Execution
LibereMutex
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ