Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
62e0fe9aa84e6a200acdc4b85a4199df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
62e0fe9aa84e6a200acdc4b85a4199df.exe
Resource
win10v2004-20231222-en
Target
62e0fe9aa84e6a200acdc4b85a4199df
Size
268KB
MD5
62e0fe9aa84e6a200acdc4b85a4199df
SHA1
5d0ef6c5a19375f17ed7fbd29d279b9c6315cdee
SHA256
e9b4cfcf2585853c3a8b7f174d29e509d7903cec6384c36e937eb6016c45ebdd
SHA512
168848297efe1fa2552bf0a1832ef96f8dd67fe667dc94828c42648a16f74ea85d5daa678ab293be841b609148ccb19b0f3921c1e203a405301d74791aecb2b8
SSDEEP
6144:bOTcplthILf4GgdksyDatJUqnTBqybOirW0Y0Db8+fgdrHvA:bOTcplYLwGgdkpUJUqnTsypW0/nxGrPA
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VerQueryValueA
GetTempFileNameA
GetTempPathA
CreateEventA
OpenProcess
GetCurrentProcessId
GetModuleFileNameA
RaiseException
GetProcAddress
Thread32Next
Thread32First
CreateToolhelp32Snapshot
WaitForSingleObject
WaitForMultipleObjects
GetTickCount
CloseHandle
Sleep
DeleteFileA
GetModuleHandleA
FindResourceA
LoadResource
InterlockedIncrement
InterlockedDecrement
SetEvent
ResetEvent
ReleaseMutex
ReleaseSemaphore
FreeLibrary
LoadLibraryA
CreateMutexA
CreateSemaphoreA
UnmapViewOfFile
GetComputerNameA
MapViewOfFile
CreateFileMappingA
Process32Next
Process32First
WriteFile
SetFilePointer
CreateFileA
GetLocalTime
GetSystemTimeAsFileTime
LockResource
GetCurrentProcess
QueryPerformanceCounter
SizeofResource
GetTimeFormatA
WideCharToMultiByte
HeapAlloc
RtlUnwind
HeapFree
GetStartupInfoA
GetCommandLineA
ExitProcess
ExitThread
CreateThread
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetCPInfo
VirtualQuery
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
FlushFileBuffers
GetOEMCP
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetTimeZoneInformation
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
SetStdHandle
ReadFile
GetLocaleInfoW
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
FormatMessageA
lstrlenA
LocalAlloc
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
GetLastError
LocalFree
GetCurrentThreadId
SetUnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetVersionExA
GetLocaleInfoA
GetACP
InterlockedExchange
GetDateFormatA
wsprintfA
SetWindowsHookExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
InitializeAcl
SetSecurityInfo
RegQueryValueExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ