Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
437949af757dfa27972b9ccc2ec4603d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
437949af757dfa27972b9ccc2ec4603d.exe
Resource
win10v2004-20231215-en
Target
437949af757dfa27972b9ccc2ec4603d
Size
294KB
MD5
437949af757dfa27972b9ccc2ec4603d
SHA1
cdf17b612e6fe9c5d312960211c9bac790b9fe33
SHA256
24373a8780fe3b4474a393211c0c3c4f6e9c949e2d01cf6ad308bdf31d7d4929
SHA512
24e43d8f535d53d398a44fdaf51986774e146ad93acc2aa971948b3dbe3aaef53c9c4dd0f29c155b0be7e52ecba69fc1623ada260f3b0f34f504caf73206739d
SSDEEP
6144:laIVWkXnNMgDtJ5tQ946xAOPyxQUWBioj:gC5nDtJ5N0wQUD
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetLastError
lstrlenA
lstrcmpiA
SetEvent
CloseHandle
CreateThread
CreateEventA
InterlockedIncrement
GetModuleFileNameA
IsDBCSLeadByte
FreeLibrary
SizeofResource
DeleteCriticalSection
FindResourceA
LoadLibraryExA
GetModuleHandleA
Sleep
GetCurrentThreadId
GetCommandLineA
FlushFileBuffers
CreateFileA
ReadFile
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
GetVersionExA
CreateMutexA
WaitForSingleObject
LoadResource
ReleaseMutex
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LoadLibraryA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
EnterCriticalSection
LeaveCriticalSection
LocalFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetProcAddress
GetSystemInfo
VirtualQuery
HeapReAlloc
GetProcessHeap
GetStartupInfoA
GetCPInfo
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
ExitProcess
WriteFile
GetStdHandle
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
CharNextA
wsprintfA
PostThreadMessageA
DispatchMessageA
GetMessageA
UnregisterClassA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryInfoKeyA
CoRegisterClassObject
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
StringFromGUID2
CoUninitialize
CoInitialize
CoRevokeClassObject
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE