Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
352a9232ae90f96f95a8889a502d8751.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
352a9232ae90f96f95a8889a502d8751.exe
Resource
win10v2004-20231215-en
Target
352a9232ae90f96f95a8889a502d8751
Size
332KB
MD5
352a9232ae90f96f95a8889a502d8751
SHA1
8f0545de195a133709c5a18545201a1699911dd6
SHA256
e929ba6bd0003666a77f94669438e5d288ee3120d5c0703da4469d494e954314
SHA512
be47283e3b48d4734e7abcf39e2b17741ce9b1440b6ffc3f4ac23270c8fb23df0f139fa5a20651dbdcecb959ede8e2718a6ed83ae9f8c0388138287acf649e63
SSDEEP
6144:0XdOd2RWPR/NUR6mAMucBiLnxlgyekAobk8r4DhGDXODZsTOyY3X:edOdnNUR6mAAw04AobXohGDXN6
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
?InitMemMng@@YAHXZ
PRRegisterObject
PRCreateProcess
PRStopServer
PRIsValidProxy
PRInitialize
PRCloseProcessRequest
PRDeinitialize
PRUnregisterObject
PRGetObjectProxy
PRReleaseObjectProxy
FSSync_ScreeSet
FSSync_Init
FSSync_DR
FSSync_DUR
FSSync_DACL
FSSync_ScreeState
FSSync_ScreeStateEx
FSSync_ScreeStateEx2
FSSync_Done
FSSync_SetCheck
FSSync_ScreeActive
FSSync_Remove
FSSync_ScreeNotify
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
GetFileSize
GetCurrentProcessId
GetCurrentThreadId
CompareFileTime
GetLastError
GetDiskFreeSpaceExA
UnmapViewOfFile
WaitForMultipleObjects
CreateProcessA
MultiByteToWideChar
MapViewOfFile
DuplicateHandle
CreateEventA
CreateFileMappingA
GetFileAttributesA
GetModuleFileNameA
WideCharToMultiByte
SetEvent
DeleteFileA
FindClose
FindNextFileA
FindFirstFileA
ReleaseMutex
lstrcpynA
GetComputerNameA
lstrlenA
GetExitCodeProcess
GetDriveTypeA
CreateThread
GetModuleHandleA
OutputDebugStringA
CreateMutexW
OpenMutexW
GetModuleFileNameW
GetVersionExA
GetFileType
GetStdHandle
CreateMutexA
OpenMutexA
ExpandEnvironmentStringsW
GetPrivateProfileStringW
GetPrivateProfileIntW
FindFirstFileW
CreateProcessW
SetProcessAffinityMask
SetErrorMode
InitializeCriticalSection
DeleteCriticalSection
lstrcpyA
LeaveCriticalSection
EnterCriticalSection
SetProcessWorkingSetSize
FreeConsole
SetConsoleCtrlHandler
LoadLibraryW
lstrcatA
ExpandEnvironmentStringsA
GetTickCount
LocalFree
FormatMessageA
SetConsoleMode
GetConsoleMode
SetConsoleTitleA
AllocConsole
GetCurrentThread
SetConsoleCursorPosition
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
GetFullPathNameA
GetTempFileNameA
CreateDirectoryA
GetTempPathA
lstrlenW
GetVersion
GetLocalTime
CreateSemaphoreA
ReleaseSemaphore
VirtualAlloc
VirtualFree
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
WaitForSingleObject
GetExitCodeThread
CreateFileA
WriteFile
CloseHandle
FlushFileBuffers
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
HeapFree
QueryPerformanceCounter
GetProcessHeap
HeapAlloc
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
UnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineW
wsprintfA
CharUpperBuffA
GetSystemMetrics
RegisterWindowMessageA
PostMessageA
ExitWindowsEx
DefWindowProcA
IsWindow
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
MsgWaitForMultipleObjects
DestroyWindow
CreateWindowExA
RegisterClassA
CopySid
RegSetValueExA
RegCloseKey
RegQueryValueExA
SetFileSecurityA
RegOpenKeyExW
RegNotifyChangeKeyValue
OpenThreadToken
RevertToSelf
SetThreadToken
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
AllocateAndInitializeSid
FreeSid
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
StartServiceA
ControlService
QueryServiceStatus
DeleteService
CreateServiceA
RegSetValueExW
RegDeleteValueA
SetServiceStatus
RegOpenKeyA
RegQueryValueExW
GetLengthSid
IsValidSid
LookupAccountNameA
GetUserNameA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegCreateKeyA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
RegOpenKeyExA
SHFileOperationA
ShellExecuteExA
_encode_pointer
_lock
_unlock
_onexit
_decode_pointer
_except_handler4_common
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
exit
_acmdln
_initterm
_initterm_e
__dllonexit
_wcsicmp
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_mbscmp
_wtoi
strchr
memcpy
memmove
_set_invalid_parameter_handler
atoi
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??3@YAXPAX@Z
??0exception@std@@QAE@XZ
__CxxFrameHandler3
_vsnprintf_s
sscanf_s
memset
sprintf_s
strcpy_s
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
??2@YAPAXI@Z
strrchr
wcsrchr
_mbschr
_mbsicmp
_mbsnbicmp
_time32
printf
_getch
sprintf
_wmakepath
_wsplitpath
vsprintf_s
_set_error_mode
malloc
free
__argc
__argv
_snprintf_s
_beginthreadex
_itoa
setlocale
_mbslen
??_U@YAPAXI@Z
??_V@YAXPAX@Z
setvbuf
_fdopen
_open_osfhandle
__iob_func
_ismbblead
_localtime32
fflush
fprintf
_vsnprintf
fclose
fgets
fopen
strerror
_errno
_snprintf
getchar
getc
_flushall
sscanf
_splitpath
_mbsnbcat_s
_mbsnbcpy_s
_configthreadlocale
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ