Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
Target
tmp
Size
1.4MB
MD5
268b3548d1f19eb229218febe0f7d0e1
SHA1
b3e71bb0390267c6d2394323efccf3e069fc70d3
SHA256
7f2faec2815fd4d00e7c607d5297e4d19232bda0676080d19f494f834d904f41
SHA512
a53967b380d19b86afc4e158eee5d6810c0b4906fa5d9bc9ccf958f0fda90c8553cf697d4c67501b4131e1a864c14c8e83b0b4d0d4db8eb58e313480b7928651
SSDEEP
24576:/XfrnXCl8VMBMTjh1UIbKZgDxCjlZ2I+UEd8X+bKs0Fwwj:vfrn351UIW6DxCjlZp+bS+bF0Fwwj
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
GetCommandLineW
CloseHandle
GetLastError
GetCurrentProcessId
TerminateProcess
OpenProcess
FreeLibrary
GetModuleFileNameW
GetProcAddress
LoadLibraryW
OutputDebugStringW
DecodePointer
RaiseException
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateProcessW
FindResourceExW
GetModuleHandleW
LoadResource
LockResource
SizeofResource
FindResourceW
LocalFree
CopyFileW
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
VerSetConditionMask
CreateFileW
GetFileAttributesExW
ReadFile
WaitForSingleObject
SetDllDirectoryW
VerifyVersionInfoW
SetEvent
CreateEventW
Sleep
GetExitCodeProcess
GetCurrentThreadId
GetSystemTime
SystemTimeToFileTime
CreateThread
GetSystemDirectoryA
LoadLibraryA
ReleaseMutex
OpenMutexW
GetTickCount
GetSystemDirectoryW
GetSystemWow64DirectoryW
GetPrivateProfileStringW
CreateMutexW
VirtualQuery
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
WideCharToMultiByte
DeleteFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
QueueUserWorkItem
UnregisterWaitEx
FlushFileBuffers
WriteFile
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
SetNamedPipeHandleState
WaitNamedPipeW
GetOverlappedResult
CancelIo
GetCurrentProcess
LocalAlloc
SetUnhandledExceptionFilter
GetProcessId
LoadLibraryExW
SetErrorMode
GetModuleHandleExW
VirtualAlloc
VirtualFree
GetSystemInfo
GetFileAttributesW
GetTempPathW
GetStartupInfoW
GetDllDirectoryW
CreateDirectoryW
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
WriteConsoleW
SetStdHandle
VirtualProtect
LoadLibraryExA
CompareFileTime
FindClose
FindFirstFileW
FindNextFileW
GetFileSizeEx
SetFilePointerEx
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetEnvironmentVariableW
lstrlenW
GetPrivateProfileIntW
GetUserDefaultUILanguage
ExpandEnvironmentStringsW
ProcessIdToSessionId
GetCompressedFileSizeW
ReleaseSemaphore
CreateSemaphoreW
GetStringTypeW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
LCMapStringW
GetLocaleInfoW
GetCPInfo
InitializeSListHead
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
RtlUnwind
InterlockedPushEntrySList
GetCommandLineA
ExitThread
FreeLibraryAndExitThread
SetConsoleCtrlHandler
GetStdHandle
ExitProcess
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetConsoleCP
GetConsoleMode
ReadConsoleW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEndOfFile
?_force_link_krpt@@YGXXZ
GetHostInterface
MdCallBack
MdCallBack12
ksGetHWND
wdGetApplicationObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ