Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
1e90f13687692b33302d4c929d35668b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e90f13687692b33302d4c929d35668b.exe
Resource
win10v2004-20231215-en
Target
1e90f13687692b33302d4c929d35668b
Size
348KB
MD5
1e90f13687692b33302d4c929d35668b
SHA1
cf5c08c5b73276e654f394aa7fc7ea2b596d8eb5
SHA256
23b80fc77ab16802e9e046a4c585d601b8129e4891214a43e615b3f75c35f317
SHA512
ad00964fff3245469f962980f1b96bd5f651e2e4324c13dd9dc3e1b855bf4373bd5050e97b105799ea75ba163990475d68decc99c3f463ad2828d045352fcb23
SSDEEP
6144:6xfID84NUHA0ET3pN6hzSVTRw0ZgS47Gg+H6cRj4/IwpRPg:Yf884p0S3pN6h+nLREDp5wwfY
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetCrackUrlW
WaitForSingleObject
Sleep
GetCurrentThreadId
CreateThread
CreateEventW
SetEvent
GetCommandLineW
OpenEventW
GetCurrentProcessId
IsValidLocale
EnumSystemLocalesA
GetCurrentProcess
GetUserDefaultLCID
CreateProcessW
CloseHandle
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
InterlockedDecrement
InterlockedIncrement
lstrcmpiW
GetModuleHandleW
GetProcAddress
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
GetStringTypeW
WriteConsoleW
LoadLibraryW
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
HeapSize
GetLocaleInfoW
GetLocaleInfoA
HeapCreate
IsProcessorFeaturePresent
LCMapStringW
GetCPInfo
RtlUnwind
LocalAlloc
LocalFree
InterlockedExchange
LoadLibraryA
WriteFile
GetFileAttributesW
ReadFile
CreateFileW
GetTempPathW
GetCurrentDirectoryW
SetLastError
ExpandEnvironmentStringsW
IsDebuggerPresent
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
AssignProcessToJobObject
GetExitCodeProcess
TerminateProcess
GetStdHandle
HeapSetInformation
ResumeThread
CreateMutexW
SetFilePointer
ReleaseMutex
FlushFileBuffers
QueryPerformanceCounter
GetNativeSystemInfo
GetVersionExW
GetSystemDirectoryW
GetWindowsDirectoryW
InterlockedExchangeAdd
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
WideCharToMultiByte
EncodePointer
DecodePointer
InitializeCriticalSection
HeapAlloc
HeapFree
UnhandledExceptionFilter
GetStartupInfoW
ExitProcess
SetStdHandle
GetFileType
HeapReAlloc
GetConsoleCP
GetConsoleMode
GetMessageW
PostThreadMessageW
TranslateMessage
DispatchMessageW
CharUpperW
IsImmersiveProcess
CharNextW
MessageBoxW
RegQueryValueExW
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
CreateProcessAsUserW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
CoResumeClassObjects
CoReleaseServerProcess
CoAddRefServerProcess
StringFromGUID2
CoUninitialize
CoInitializeEx
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
SysFreeString
SysStringLen
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
CreateEnvironmentBlock
DestroyEnvironmentBlock
timeGetTime
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ