Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
14275154596be8c7fce9681e47ffbb1e_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
14275154596be8c7fce9681e47ffbb1e_JC.exe
Resource
win10v2004-20230915-en
Target
14275154596be8c7fce9681e47ffbb1e_JC.exe
Size
206KB
MD5
14275154596be8c7fce9681e47ffbb1e
SHA1
295623af573d185af72e0917a5516f3273346f4f
SHA256
340833a30905d747205f3aa0b2d038e9b1d4bdda710a7ac106105cf36c38a578
SHA512
4a6a12f6572caba289ec7b0356918e26e2e5d2f644b3222895f12c299fa213d02326b5614f71fabed1741f1114c05267daeeb443a36ff68b631a5729d1a56b26
SSDEEP
3072:/nY9tqi07/+8qZip+YRADRddUpBYzkcGSaUyRt6umF4T/L+htRTA5M9Qfcl:/Y9P07/O2+UGd0HPRhT/L+hU5wkcl
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetStartupInfoW
SearchPathW
GetWindowsDirectoryA
CopyFileA
lstrcmpiA
CompareStringA
GetLocaleInfoW
GetSystemTime
GetVolumeInformationW
GetFileAttributesA
OpenMutexW
CreateEventW
GetThreadPriority
lstrcpyn
IsBadStringPtrW
GetAtomNameW
ExitThread
GetExpandedNameA
GetCalendarInfoW
SetThreadPriority
CreateDirectoryW
OpenFile
GetFullPathNameA
IsBadWritePtr
GetNumberFormatW
GetProcessHeap
CreateEventA
SetPriorityClass
GetProcAddress
LocalFree
FreeResource
GetModuleHandleA
EndUpdateResourceW
lstrlenW
IsChild
SetFocus
SetDlgItemTextA
GetMenuItemRect
CopyIcon
DefFrameProcW
CopyRect
AnimateWindow
EndMenu
EnumChildWindows
CreateDesktopA
CharNextA
wsprintfW
GetDlgItemTextW
GetAsyncKeyState
SetForegroundWindow
PostMessageA
EnumWindows
CreateDialogIndirectParamW
GetCapture
CharPrevW
GetMenuStringA
FrameRect
RegisterWindowMessageW
FindWindowW
LoadIconW
CloseWindow
wvsprintfA
CreateAcceleratorTableW
MessageBoxIndirectW
RegisterClassExA
SetCapture
IsMenu
LoadCursorW
CallWindowProcA
SetWindowLongW
GetMenuItemInfoW
TrackPopupMenuEx
DefDlgProcW
SetTimer
CharUpperW
GetCursorPos
GetMenuStringW
GetDCEx
MessageBoxW
GetSysColorBrush
SetCursorPos
CheckRadioButton
CreateWindowExW
SetMetaRgn
RealizePalette
CreateFontIndirectExW
GetWorldTransform
CreatePalette
OffsetViewportOrgEx
SetMapperFlags
AnimatePalette
OffsetRgn
SetPixel
EndFormPage
RegFlushKey
RegCreateKeyExW
RegQueryValueW
RegCreateKeyExA
RegOpenKeyW
ShellExecuteW
ShellExecuteA
ExtractIconW
StrNCmpA
ExtractIconExA
ExtractAssociatedIconExW
SHGetDiskFreeSpaceExA
StrChrW
UrlCombineA
SetupGetStringFieldA
SetupDiGetSelectedDevice
CM_Open_DevNode_Key_Ex
CM_Find_Range
SetupDiGetHwProfileFriendlyNameExA
SetupVerifyInfFileA
pSetupIsUserAdmin
SetupDiDrawMiniIcon
pSetupAddMiniIconToList
SetupUninstallOEMInfA
CM_Get_Log_Conf_Priority
FindNextUrlCacheContainerA
CreateMD5SSOHash
FtpDeleteFileA
InternetGetConnectedStateEx
InternetWriteFile
InternetGetCookieExW
CommitUrlCacheEntryA
UrlZonesDetach
SetUrlCacheEntryInfoA
InternetEnumPerSiteCookieDecisionW
HttpSendRequestExW
UnlockUrlCacheEntryFileW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ