Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3c15867342904dd0868e7f504b52d759.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c15867342904dd0868e7f504b52d759.exe
Resource
win10v2004-20231215-en
Target
3c15867342904dd0868e7f504b52d759
Size
161KB
MD5
3c15867342904dd0868e7f504b52d759
SHA1
5a4830214f94e3f57a529fffcdaa1b3253916212
SHA256
6cb8baa893c1858d22b5bf80521a39c0d60683407d614e409ac95f7d8992e810
SHA512
1426a7355647e7bb3dd374653b530af3f439ac0b02b24d0e52e7635f2f92ba543f30fdc42820eb9814f2cd4a3c0c258ce99ef473943de84e25b95447739b9277
SSDEEP
3072:fJRAJ202c15r9SLSi3k6B3M3bo2e8ag5msz3nYGPVT:fDA9J3rULV3V3MroVgYEZ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ShellExecuteW
SHGetFolderPathW
CommandLineToArgvW
OpenEventW
SetEvent
ProcessIdToSessionId
GetCommandLineW
GetSystemDirectoryW
SetLastError
GetLastError
GetCurrentProcess
GetExitCodeThread
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
GetModuleFileNameW
VirtualAllocEx
TerminateProcess
Sleep
CreateProcessW
GetVersionExW
CloseHandle
OpenProcess
GetModuleHandleW
GetProcAddress
GetCurrentProcessId
SetEnvironmentVariableW
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
GetStringTypeW
FreeLibrary
LocalFree
GetSystemTime
FormatMessageW
LoadLibraryW
MultiByteToWideChar
GetCurrentThreadId
OutputDebugStringW
GetSystemTimeAsFileTime
CreateFileW
CreateFileA
ReleaseMutex
TlsGetValue
TlsSetValue
HeapAlloc
GetProcessHeap
HeapFree
OpenThread
TlsAlloc
TlsFree
GetModuleHandleA
GetEnvironmentVariableW
CreateMutexW
ReadFile
SetFilePointerEx
WriteFile
GetFileSizeEx
DeviceIoControl
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFilePointer
GetFileType
GetStartupInfoW
RaiseException
RtlUnwind
HeapReAlloc
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
HeapSize
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringA
WideCharToMultiByte
GetStringTypeA
WaitForInputIdle
FindWindowW
GetWindowThreadProcessId
GetActiveWindow
MessageBoxW
RegCloseKey
RegQueryValueExA
RegQueryValueExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RevertToSelf
CreateProcessAsUserW
ImpersonateLoggedOnUser
DuplicateTokenEx
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RegOpenKeyExW
RegEnumKeyExW
CoInitialize
CoCreateInstance
CoUninitialize
PathAppendW
PathFileExistsW
PathFindFileNameW
GetModuleFileNameExW
EnumProcesses
WTSFreeMemory
WTSQuerySessionInformationW
DestroyEnvironmentBlock
CreateEnvironmentBlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ