Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
26fc684c3ce107bdccaeda89e34c6823.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
26fc684c3ce107bdccaeda89e34c6823.exe
Resource
win10v2004-20231215-en
Target
26fc684c3ce107bdccaeda89e34c6823
Size
91KB
MD5
26fc684c3ce107bdccaeda89e34c6823
SHA1
c877404befed6f8f0fd8d1e400ddc4ca030f6c4a
SHA256
1540b707d909cfa625cf6dee90d831dde99871b369d7e614985694cd8ca5dfff
SHA512
3e3f742145a35ec58fe7cd163e20a355c2ddb4246aa88420e4e26a6d2c503a0e8a3a583c98f6fc0e9fff9d89a3d9288b677cc51771479b2f756737c1bf3dab93
SSDEEP
1536:T7n7FNCMTN1Cyzj3WNy6StxFB6amPCJisKldZbe5NvVAOJDHZ5:TTxt1FzmhStxFBDm7dSzVhZ5
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord3
ord2
ReadRegEntrySz
lstrcmpA
lstrcpyA
FindClose
FindFirstFileA
LocalFree
lstrcatA
GetSystemDirectoryA
LocalAlloc
FindNextFileA
CompareStringA
GetCurrentThreadId
LoadLibraryA
OpenFile
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetProcAddress
SetEvent
HeapReAlloc
GetLastError
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WriteFile
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
TlsGetValue
TlsAlloc
TlsSetValue
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
GetSystemDefaultLangID
lstrlenA
GetVersionExA
Sleep
CreateMutexA
OpenFileMappingA
MapViewOfFile
OpenEventA
VirtualAlloc
WaitForSingleObject
ReleaseMutex
CloseHandle
UnmapViewOfFile
SetLastError
TerminateProcess
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
GetWindowThreadProcessId
IsWindowVisible
GetWindow
GetWindowTextA
GetAncestor
GetClassNameA
GetClassLongA
IsWindow
SystemParametersInfoA
SetForegroundWindow
IsIconic
ShowWindow
MessageBoxA
InsertMenuItemA
EnumWindows
GetWindowLongA
CreatePopupMenu
GetMenuItemCount
LoadStringA
GetCursorPos
TrackPopupMenuEx
GetMenuItemInfoA
DestroyMenu
DestroyIcon
FindWindowA
LoadImageA
GetSysColorBrush
GetSysColor
FillRect
DrawIconEx
GetDC
GetSystemMetrics
ReleaseDC
DestroyWindow
PostQuitMessage
DefWindowProcA
RegisterClassA
CreateWindowExA
UpdateWindow
GetMessageA
DispatchMessageA
TranslateMessage
wsprintfA
AttachThreadInput
SendInput
SendMessageA
PostMessageA
GetForegroundWindow
SetTextColor
SetTextAlign
TextOutA
CreateFontIndirectA
SelectObject
GetTextExtentPoint32A
DeleteObject
GetStockObject
SetBkColor
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SHGetFileInfoA
ExtractIconExA
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
PathFileExistsA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE