Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
0e004c001f33719e30fef6a7f78cf412.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e004c001f33719e30fef6a7f78cf412.exe
Resource
win10v2004-20231215-en
Target
0e004c001f33719e30fef6a7f78cf412
Size
391KB
MD5
0e004c001f33719e30fef6a7f78cf412
SHA1
d4542a5adbffc07b0bb734b48ebbdbb9d78f3ea1
SHA256
16782712e6206b32ffcf87c07c554ffe14d537a9152cb48c82f8698be3a923cb
SHA512
0eccd24daf980eab6da636b4ed27e6d4fa2407d9529534de9a035a0e8f679de1b64fb968211b8430f243cf886beb0f6ea569150726f3b85d0b8bf234d560b2b3
SSDEEP
6144:OHClnVloa3l3HR8qiyiRQ82K7ijbuED/U5yRUq1cguNd1oy8Ji:OHClw2lXR8Wim82KujaED3N1v0z
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
InternetCloseHandle
InternetOpenUrlW
InternetReadFile
InternetOpenW
timeGetTime
PathFileExistsW
PathAppendW
PathIsDirectoryW
PathRemoveFileSpecW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WaitForSingleObject
Sleep
GetCurrentProcess
GetExitCodeProcess
CreateProcessW
GetLocalTime
FindResourceExW
FreeLibrary
GetModuleFileNameW
GetProcAddress
LoadLibraryExW
LoadResource
LockResource
SizeofResource
LocalAlloc
LocalFree
FindResourceW
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
CopyFileW
MoveFileExW
MultiByteToWideChar
lstrlenW
IsDebuggerPresent
WriteFile
GetTempPathW
GetCurrentDirectoryW
SetLastError
GetFileAttributesExW
FindFirstFileExW
ExpandEnvironmentStringsW
InterlockedCompareExchange
GetNativeSystemInfo
GetModuleHandleW
GetVersionExW
CreateMutexW
HeapDestroy
GetTickCount
FormatMessageA
GetModuleHandleA
OutputDebugStringA
ReleaseMutex
GetCurrentProcessId
SystemTimeToFileTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
SetFilePointerEx
FlushFileBuffers
OpenProcess
LeaveCriticalSection
EnterCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
TerminateProcess
GetCurrentThreadId
GetCommandLineW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
InterlockedExchangeAdd
GetModuleHandleExW
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
WideCharToMultiByte
GetLastError
RaiseException
CloseHandle
DecodePointer
RemoveDirectoryW
ReadFile
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
CreateFileW
CreateDirectoryW
GetStdHandle
GetFileType
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
SetStdHandle
WriteConsoleW
GetDriveTypeW
SetEnvironmentVariableA
CreateFileA
DeviceIoControl
SetFilePointer
GetOEMCP
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
GetConsoleMode
GetConsoleCP
GetFullPathNameW
IsProcessorFeaturePresent
ExitProcess
OutputDebugStringW
GetStringTypeW
EncodePointer
LoadLibraryExA
AllocateAndInitializeSid
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
GetTokenInformation
FreeSid
CheckTokenMembership
OpenProcessToken
CoInitialize
CoInitializeSecurity
CoTaskMemFree
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
MessageBoxW
VariantClear
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE