Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
4f96886887940988015e2943f5b50f4e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4f96886887940988015e2943f5b50f4e.exe
Resource
win10v2004-20231215-en
Target
4f96886887940988015e2943f5b50f4e
Size
252KB
MD5
4f96886887940988015e2943f5b50f4e
SHA1
87e4a1bce1c289e87e212827adec6cd8af357dcb
SHA256
44cc17f0507cd35be79db24bdeef44e8beb4198be93b8e80eb9e1875472a3181
SHA512
3518960af84805d23be36d6b5ec51d0a087fc9f4b3aff37f4cb46cd56b2b8368bad12ec00684a192a10579a3ab5cac9b639e9deba565646b25cb76f2e08317bb
SSDEEP
3072:5TR5rST7g9MfLrcnaha0AvOkZfvh8VZ1uF9hnQTBf/2NAP9UlNyJm5XRJOMEXOOt:5TS/1LYahzIvVKSF7QTBnO5BJO3eO8y
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentThreadId
InterlockedDecrement
RaiseException
InterlockedIncrement
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
lstrcmpA
FlushFileBuffers
GetCurrentProcess
GetFullPathNameA
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
ExitProcess
RtlUnwind
ExitThread
CreateThread
TerminateProcess
GlobalGetAtomNameA
HeapFree
VirtualProtect
VirtualAlloc
GetTimeFormatA
GetDateFormatA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetCurrentProcessId
UnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetDriveTypeA
IsBadCodePtr
SetEnvironmentVariableA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
GetModuleHandleA
FileTimeToSystemTime
GlobalLock
GlobalUnlock
FormatMessageA
GetLongPathNameA
SetFileAttributesA
CopyFileA
GetPrivateProfileIntA
CreateProcessA
SetUnhandledExceptionFilter
IsBadReadPtr
VirtualQuery
GetFileTime
GetSystemTimeAsFileTime
GetSystemInfo
GlobalMemoryStatus
FileTimeToLocalFileTime
FileTimeToDosDateTime
WritePrivateProfileStringA
GetPrivateProfileStringA
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
LoadLibraryA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GlobalAlloc
GlobalFree
MultiByteToWideChar
lstrcpynA
LoadLibraryExA
GetProcAddress
FreeLibrary
GetTickCount
CreateFileA
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateDirectoryA
GetModuleFileNameA
LockFile
WriteFile
UnlockFile
ReadFile
GetFileSize
SetFilePointer
SetEndOfFile
GetFileAttributesA
lstrcpyA
LocalFree
LocalAlloc
lstrlenA
SetEvent
TerminateThread
SetLastError
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
WaitForSingleObject
Sleep
CreateEventA
GetLastError
CloseHandle
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
HeapAlloc
ValidateRect
ClientToScreen
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetDC
ReleaseDC
GetSysColorBrush
IsWindowEnabled
SetWindowTextA
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetDlgItem
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
GetKeyState
EnableWindow
SetForegroundWindow
GetClientRect
GetMenu
GetSysColor
AdjustWindowRectEx
GetParent
PostMessageA
DispatchMessageA
PeekMessageA
wsprintfA
SetDlgItemTextA
SendDlgItemMessageA
UpdateWindow
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
CopyRect
PtInRect
GetWindow
GetMenuState
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetMenuItemID
LoadIconA
ShowWindow
CreateWindowExA
EndDialog
GetSubMenu
DestroyMenu
GetCursorPos
LoadMenuA
PostQuitMessage
EndPaint
BeginPaint
DestroyWindow
MessageBoxA
DialogBoxParamA
GetDesktopWindow
DefWindowProcA
RegisterClassExA
LoadCursorA
GetMessageA
TranslateMessage
TranslateAcceleratorA
LoadAcceleratorsA
LoadStringA
SendMessageA
GetMenuItemCount
GetClassNameA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
GetDeviceCaps
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
CreateBitmap
ExtTextOutA
SetBkColor
SetTextColor
GetClipBox
RectVisible
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetUserNameA
RegCloseKey
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyA
RegQueryValueExA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
ord17
UrlUnescapeA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
socket
inet_addr
closesocket
shutdown
setsockopt
connect
gethostbyname
htons
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetGetConnectedState
InternetCrackUrlA
InternetCanonicalizeUrlA
VariantClear
VariantChangeType
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE