Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
489cd01384280dd81eea309cf7661db8cb24c93938aef458494dce7123e4fefd.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
489cd01384280dd81eea309cf7661db8cb24c93938aef458494dce7123e4fefd.exe
Resource
win10v2004-20231020-en
Target
489cd01384280dd81eea309cf7661db8cb24c93938aef458494dce7123e4fefd.exe.zip
Size
64.4MB
MD5
166fcaf8b024d077bb0de31240b4fc42
SHA1
10ce559f537dd54aae2944bebfce201301885c95
SHA256
c03c11df410165bfdf84b35c979bc5e42af11e3642b33b7ae1d9a94bd8cc0fef
SHA512
9e98da3012750907349ad550fbbfe279fa8e6cc4997d6bd0f26bd328925143947000464ea7063a7d37357e838d9ef9ca3a0afd3a57f291e0c2c6542f25376641
SSDEEP
1572864:5j0tnm/5wFUSdu6Zf4UW7xkU2OSYBBgqN/t7:5wMqPduafUK4xNh
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetWindowThreadProcessId
UnhookWindowsHookEx
SetCursor
LoadCursorA
GetDlgItemTextA
EndDialog
keybd_event
LoadIconA
SendMessageA
SetWindowTextA
SetDlgItemTextA
DialogBoxParamA
ChangeDisplaySettingsExA
GetWindowRect
GetSystemMetrics
MoveWindow
LoadStringA
wvsprintfA
EnumDisplayDevicesA
RegisterWindowMessageA
FindWindowA
SetWindowsHookExA
GetKeyState
CallNextHookEx
GetWindowTextA
GetDlgItem
LoadBitmapA
SendDlgItemMessageA
EnumDisplaySettingsA
RegisterClassExA
CreateWindowExA
AttachThreadInput
GetForegroundWindow
SetForegroundWindow
SystemParametersInfoA
DefWindowProcA
ExitWindowsEx
DestroyWindow
UnregisterClassA
MessageBoxA
PostMessageA
PathUnquoteSpacesA
wvnsprintfA
PathRemoveFileSpecA
PathRemoveBlanksA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
ord31
ord204
ord67
ord159
ord117
ord8
ord91
ord160
FindResourceA
LocalFree
FormatMessageA
WriteFile
CreateFileA
SizeofResource
LockResource
LoadResource
GetPrivateProfileStringA
GetExitCodeProcess
WaitForSingleObject
GetModuleFileNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
InterlockedDecrement
GetLongPathNameA
GetTempPathA
GetCurrentThreadId
CopyFileA
CreateMutexA
GetTickCount
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileSectionA
OpenProcess
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
RtlUnwind
GetFileAttributesA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitThread
ResumeThread
GetWindowsDirectoryA
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThread
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringA
MultiByteToWideChar
LCMapStringW
Sleep
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
GetStringTypeA
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
GetSystemDirectoryA
CloseHandle
DeleteFileA
GetProcAddress
SetErrorMode
LoadLibraryA
GetLastError
FreeLibrary
GetVersionExA
GetLocalTime
LocalAlloc
CreateThread
DeleteDC
CreateDCA
CreateSolidBrush
ExtEscape
OpenThreadToken
DuplicateToken
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteValueA
RegCreateKeyA
RegFlushKey
RegSetValueExA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ShellExecuteExA
PlaySoundA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ