Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
22f87c22001fadb672567dcfad807895.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22f87c22001fadb672567dcfad807895.exe
Resource
win10v2004-20231215-en
Target
22f87c22001fadb672567dcfad807895
Size
4.4MB
MD5
22f87c22001fadb672567dcfad807895
SHA1
1c25a5a5b92f82980db4bd2456088a041f7be0f1
SHA256
05f49bcfeb3903de89fdd53353c0ba32a838f0aa3d27875f0911b646f44fa7c8
SHA512
d7ea18409643208a78fd11e8095376a866173e82cacb6e58e7b833e305b4c922c0eb4b4a415231e1a07005ccb48e0452ead8c67e0a31204fcca2e7670300bb99
SSDEEP
98304:oiGGv0wqsNhjtjGH5YfHqQUReYNa1pVsDpAuieG2ah:fJ0whBjGZYfTU3Na1HsDpAzTh
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetCloseHandle
InternetCrackUrlW
InternetReadFile
InternetConnectW
HttpSendRequestW
InternetOpenW
HttpOpenRequestW
RpcStringFreeW
UuidToStringW
PathRemoveFileSpecW
SHDeleteValueW
SHGetValueW
SHDeleteKeyW
SHSetValueW
PathRemoveExtensionW
PathFindFileNameW
LCMapStringW
GetCurrentThreadId
TlsFree
TlsSetValue
GetLastError
GetModuleHandleW
InitializeCriticalSection
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateDirectoryW
CopyFileW
DeleteFileW
WaitForSingleObject
CloseHandle
CreateThread
ExitProcess
HeapAlloc
GetProcessHeap
CreateProcessW
HeapFree
OpenProcess
SetLastError
GetProcAddress
GetModuleHandleA
GetCurrentProcessId
HeapReAlloc
GetFileSize
FindResourceA
FindFirstFileW
SetFilePointer
FreeResource
LoadResource
MoveFileExW
GetTickCount
WriteFile
LoadLibraryW
SizeofResource
ReadFile
CreateFileW
GetTempPathW
FindClose
LocalAlloc
LockResource
RemoveDirectoryW
FindNextFileW
LocalFree
GetTimeZoneInformation
MapViewOfFile
UnmapViewOfFile
SetEvent
OpenFileMappingW
OpenEventW
ReleaseMutex
GetCurrentProcess
GetVersionExW
TerminateProcess
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
GetVersion
FindResourceW
GetModuleFileNameW
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedIncrement
GetCPInfo
HeapSize
HeapCreate
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
SetHandleCount
RtlUnwind
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetStdHandle
FlushFileBuffers
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
CreateMutexW
DecodePointer
EncodePointer
RaiseException
LoadLibraryA
InterlockedExchange
FreeLibrary
GetStringTypeW
ShowWindow
PostMessageW
FindWindowExA
GetShellWindow
SendMessageW
LoadCursorW
MessageBoxW
LoadIconW
CreateWindowExW
GetSystemMetrics
SetWindowTextW
DestroyIcon
DispatchMessageW
TranslateMessage
GetMessageW
DefWindowProcW
SetWindowLongW
GetWindowLongW
SetForegroundWindow
PostQuitMessage
RegisterClassExW
SendMessageA
GetWindowThreadProcessId
MessageBoxIndirectW
GetWindowRect
FreeSid
SetEntriesInAclW
SetSecurityInfo
AllocateAndInitializeSid
GetSecurityInfo
DuplicateTokenEx
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
SHGetPathFromIDListW
SHGetSpecialFolderPathW
ShellExecuteW
SHBrowseForFolderW
SHGetMalloc
CoInitializeEx
CoCreateInstance
CoCreateGuid
CoUninitialize
SysAllocString
SysFreeString
VariantClear
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ