Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
4e9271b743d0b742cc36c28962d9ae3a261032c5aa2ebf0f55db29d90ba35314.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4e9271b743d0b742cc36c28962d9ae3a261032c5aa2ebf0f55db29d90ba35314.exe
Resource
win10v2004-20231020-en
Target
4e9271b743d0b742cc36c28962d9ae3a261032c5aa2ebf0f55db29d90ba35314
Size
1.1MB
MD5
f4cc4f53da7506eadb9cb798a3fb4524
SHA1
93128c2c615da85ae920b8b0684afb3180ebc173
SHA256
4e9271b743d0b742cc36c28962d9ae3a261032c5aa2ebf0f55db29d90ba35314
SHA512
cd80de334a19252955afddfab53559e384c3764042ed9998c20d0876846f4396624d1c53c573d2e77f662df8e8366f65af432d2642049e91bbf9ba4c26873646
SSDEEP
24576:ieCwL4usYzhWUFdtV2IHscjvAZ8Q46cTRorEH7Hx:ieC1whF/2IMsvAZ8QlcTRZ
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetModuleFileNameW
GetProcAddress
LoadLibraryW
GetCommandLineW
CloseHandle
GetLastError
Sleep
GetCurrentProcessId
TerminateProcess
GetCurrentThreadId
OpenProcess
GetSystemDirectoryW
GetSystemWow64DirectoryW
GetModuleHandleW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DeleteFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WaitForSingleObject
WaitForMultipleObjects
CreateThread
QueueUserWorkItem
UnregisterWaitEx
LocalFree
GetTempPathW
GetStartupInfoW
GetTickCount
SetDllDirectoryW
GetDllDirectoryW
CopyFileW
GetSystemTime
SystemTimeToFileTime
GetExitCodeProcess
VerSetConditionMask
GetCurrentProcess
LocalAlloc
VerifyVersionInfoW
CreateFileW
ReadFile
WriteFile
SetNamedPipeHandleState
WaitNamedPipeW
GetOverlappedResult
CancelIo
FlushFileBuffers
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateDirectoryW
GetFileAttributesW
GetPrivateProfileStringW
MultiByteToWideChar
WideCharToMultiByte
SetUnhandledExceptionFilter
CreateProcessW
GetProcessId
LoadLibraryExW
OutputDebugStringW
DecodePointer
RaiseException
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionAndSpinCount
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
SetEvent
CreateEventW
GetModuleHandleExW
VirtualAlloc
VirtualFree
GetFileAttributesExW
GetSystemInfo
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
WriteConsoleW
VirtualProtect
VirtualQuery
LoadLibraryExA
lstrlenW
GetPrivateProfileIntW
ExpandEnvironmentStringsW
ProcessIdToSessionId
CompareFileTime
FindClose
FindFirstFileW
FindNextFileW
GetFileSizeEx
SetFilePointerEx
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCompressedFileSizeW
ReleaseSemaphore
CreateSemaphoreW
GetStringTypeW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
InitializeSListHead
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
RtlUnwind
InterlockedPushEntrySList
SetConsoleCtrlHandler
ExitThread
FreeLibraryAndExitThread
GetStdHandle
ExitProcess
SetEnvironmentVariableW
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleCP
GetConsoleMode
ReadConsoleW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
SetEndOfFile
GetHostInterface
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ