Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3c881c0acde5e940dee188470b1f85c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c881c0acde5e940dee188470b1f85c1.exe
Resource
win10v2004-20231215-en
Target
3c881c0acde5e940dee188470b1f85c1
Size
322KB
MD5
3c881c0acde5e940dee188470b1f85c1
SHA1
e097254a1041cf0a961829992e0c6817315b85ec
SHA256
ddc4a95080513998a04bc82070e7a3426a333c9e10beb68d4375410d084f0f1e
SHA512
51a030551361e3a4654b371f04ccc436ea13df502f1a2ea2054531147124bf8e8ab264ed0e248016b6d2cdd73b2506087db760d2e9484f27f62856e4b185792d
SSDEEP
6144:N0VW65krPHwW2VVOYruRNVEebbInJ0JOhfaF6:NgW65krPHwWOOYruRNVEebbInS56
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrRetToStrA
PathIsRootA
PathIsDirectoryA
GetExtractorSize
ord2958
ord5214
ord4238
ord1402
ord5915
ord6725
ord2092
ord2370
ord715
ord3182
ord1482
ord629
ord1439
ord2903
ord383
ord2168
ord4320
ord1903
ord3292
ord2991
ord1581
ord1643
ord1892
ord3934
ord3761
ord630
ord3088
ord2021
ord385
ord631
ord2280
ord386
ord911
ord1486
ord3195
ord587
ord741
ord3317
ord4240
ord1591
ord2095
ord3164
ord4232
ord1545
ord2086
ord558
ord746
ord1006
ord1185
ord736
ord5969
ord3312
ord1588
ord1646
ord3683
ord4541
ord757
ord566
ord3333
ord4481
ord2838
ord5566
ord5213
ord5230
ord4568
ord3948
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord1054
ord2248
ord2451
ord5233
ord1790
ord6236
ord1191
ord1187
ord602
ord3180
ord5719
ord5921
ord5401
ord5414
ord5588
ord5523
ord5647
ord5642
ord5727
ord6037
ord5888
ord6057
ord4161
ord6054
ord5608
ord6060
ord5611
ord2527
ord2263
ord2233
ord758
ord567
ord3287
ord3163
ord3423
ord3684
ord4261
ord4115
ord4001
ord4123
ord2368
ord3204
ord4394
ord3891
ord326
ord3989
ord5613
ord1728
ord6118
ord3302
ord2372
ord6062
ord3596
ord760
ord2654
ord5634
ord5635
ord589
ord330
ord3337
ord5403
ord1467
ord3587
ord754
ord1930
ord3680
ord1565
ord3401
ord3997
ord5563
ord1005
ord2884
ord2867
ord1440
ord1207
ord2288
ord4350
ord3799
ord2878
ord907
ord4108
ord2272
ord3991
ord3255
ord5331
ord262
ord6297
ord2346
ord6286
ord1580
ord1181
ord5320
ord3328
ord2987
ord3883
ord5868
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4262
ord354
ord310
ord416
ord347
ord784
ord605
ord578
ord651
ord658
ord3441
ord764
ord3230
ord572
ord1063
ord2367
ord5637
ord1279
ord1280
ord1123
ord3210
ord3161
ord1084
ord6703
ord299
ord1489
ord266
ord620
ord4104
ord265
ord2883
ord6090
ord2902
ord5529
ord4109
ord781
ord2322
ord4580
ord1281
ord304
ord501
ord709
ord4749
ord2469
ord876
ord6067
ord297
ord762
ord5731
ord502
ord5641
ord2264
ord4125
ord2468
ord3641
ord1794
ord1934
ord1929
ord1969
ord5182
ord4212
ord4735
ord4890
ord2020
ord1671
ord1670
ord1551
ord6724
ord5912
ord1620
ord1617
ord3946
ord1401
ord4244
ord5152
ord1908
ord5073
ord6275
ord4185
ord5203
ord3403
ord4722
ord4282
ord1600
ord5960
ord5640
ord5235
ord4353
ord2748
??1exception@std@@UAE@XZ
_setmbcp
??0exception@std@@QAE@XZ
qsort
_mbsnicmp
_purecall
printf
sprintf_s
?terminate@@YAXXZ
_unlock
?what@exception@std@@UBEPBDXZ
__CxxFrameHandler3
memset
__argv
__argc
strlen
_splitpath_s
_mbscmp
_vsnprintf
strcpy_s
strcat_s
strcmp
_splitpath
memcpy
_resetstkoflw
wcslen
wcscpy_s
malloc
free
calloc
??0exception@std@@QAE@ABQBD@Z
__dllonexit
_except_handler4_common
_recalloc
labs
_invalid_parameter_noinfo
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_encode_pointer
_decode_pointer
_onexit
_lock
memmove_s
GetThreadLocale
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
GetModuleHandleA
GetCurrentProcess
GetSystemInfo
CreateProcessA
LocalAlloc
LocalFree
GetSystemDefaultLangID
GetUserDefaultLangID
OpenEventA
OpenFileMappingA
MapViewOfFile
SetEvent
ResetEvent
SetLastError
WaitNamedPipeA
SetNamedPipeHandleState
GetVersionExA
GetTickCount
GetDriveTypeA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeCriticalSection
lstrlenA
lstrcmpiA
lstrcmpiW
GetStringTypeExA
GetStringTypeExW
WideCharToMultiByte
lstrlenW
CompareStringA
CompareStringW
GetEnvironmentVariableA
MultiByteToWideChar
InterlockedExchange
GetVersion
GetEnvironmentVariableW
CreateMutexA
Sleep
RemoveDirectoryA
GetFileAttributesA
WaitForSingleObject
TerminateThread
InterlockedIncrement
CreateThread
OutputDebugStringA
GetShortPathNameA
FindFirstFileA
GetLastError
FindClose
FindNextFileA
FreeLibrary
LoadLibraryA
GetProcAddress
GetSystemDirectoryA
GetCurrentProcessId
WriteFile
CreateFileA
ReadFile
CloseHandle
DeleteFileA
GetLocaleInfoA
GetACP
IsWindow
DrawIconEx
GetSystemMetrics
OffsetRect
ShowWindow
SetWindowPos
LoadCursorA
PtInRect
SetCursor
GetParent
RedrawWindow
UpdateWindow
FillRect
GetSysColor
InflateRect
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CopyRect
IntersectRect
SetRectEmpty
GetIconInfo
CreateIconIndirect
GetDesktopWindow
ReleaseDC
IsRectEmpty
GetWindowRect
GetCursorPos
CharUpperA
CharUpperW
CharLowerA
DrawIcon
SendMessageA
IsIconic
GetClientRect
CharLowerW
FindWindowA
DestroyIcon
SetTimer
SetForegroundWindow
PostMessageA
LoadIconA
EnableWindow
InvalidateRect
GetDC
SetRect
TextOutA
ExtTextOutA
Escape
GetTextExtentPoint32A
LineTo
MoveToEx
CreateRoundRectRgn
FillRgn
Rectangle
StretchBlt
SetStretchBltMode
SetTextColor
PtVisible
GetBkColor
GetMapMode
GetViewportExtEx
GetWindowExtEx
DPtoLP
LPtoDP
Polygon
CreatePolygonRgn
GetRgnBox
FillPath
EndPath
PolyBezier
BeginPath
CreatePen
CreateBitmap
GetPixel
SetPixel
DeleteDC
GetDeviceCaps
EnumFontFamiliesExA
SelectObject
GetObjectA
CreateFontIndirectA
GetStockObject
BitBlt
CreateRectRgnIndirect
RectVisible
RoundRect
CreateCompatibleDC
CreateCompatibleBitmap
SetBkColor
CreateSolidBrush
DeleteObject
GradientFill
TransparentBlt
ControlService
StartServiceA
QueryServiceConfigA
ChangeServiceConfigA
OpenServiceA
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegOpenKeyExA
RegCreateKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
QueryServiceStatus
SHGetDesktopFolder
SHGetSpecialFolderPathA
SHGetMalloc
SHGetFileInfoA
SHGetSpecialFolderLocation
ShellExecuteExA
_TrackMouseEvent
CoTaskMemFree
SysFreeString
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE