Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
fb60b0a186c7c33f2e97c180c950c969.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fb60b0a186c7c33f2e97c180c950c969.exe
Resource
win10v2004-20231215-en
Target
fb60b0a186c7c33f2e97c180c950c969
Size
288KB
MD5
fb60b0a186c7c33f2e97c180c950c969
SHA1
bc41de764d5b327d780e8eb364fb9466db7308e5
SHA256
131e246c58113ec05ff47da417f6768d4dbdeab785548cf0ceee2f4071d9587e
SHA512
efbd35f758f378f00d457636926c581bb2c560c8589a332cda0fb580296a71939f83bf7afc554291a5fd6c04ca68c5b84cf89e402bb12fac91a801ed7a8aa122
SSDEEP
6144:MP8jKjCQp9UC/IniOD2Z6rGMnXgun+tZu4GDc19IWAwE4:MP8jKjCQp9lIni9ZyiZ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
FindFirstFileA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GlobalDeleteAtom
GlobalAlloc
GlobalLock
FreeResource
LockResource
LoadResource
FindResourceA
GlobalFree
GlobalUnlock
lstrcpynA
lstrcmpiA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
SetLastError
MulDiv
WritePrivateProfileStringA
lstrcpyA
GlobalFlags
GetLastError
LocalAlloc
LocalFree
LeaveCriticalSection
GlobalReAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
WideCharToMultiByte
GetProcessVersion
GetCPInfo
GetOEMCP
SetErrorMode
SetFilePointer
FlushFileBuffers
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
RtlUnwindEx
ExitProcess
RaiseException
RtlPcToFileHeader
GetACP
HeapReAlloc
HeapSize
Sleep
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapSetInformation
HeapCreate
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoA
SetStdHandle
FindNextFileA
FindClose
RemoveDirectoryA
GetFileAttributesA
SetFileAttributesA
GetTickCount
GetSystemDirectoryA
GetWindowsDirectoryA
DeleteFileA
GetCurrentDirectoryA
ExpandEnvironmentStringsA
LoadLibraryA
FreeLibrary
CreateThread
GetModuleFileNameA
MultiByteToWideChar
lstrcmpA
GetVersionExA
GetModuleHandleA
GetProcAddress
CreateFileA
lstrlenA
WriteFile
CloseHandle
CreateProcessA
SetThreadPriority
GetCurrentThread
GetCurrentProcess
SetPriorityClass
lstrcatA
ResumeThread
RegOpenKeyExA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
RegEnumKeyExA
RegEnumKeyA
RegEnumValueA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
GetUserNameA
LookupPrivilegeValueA
GetClassInfoA
wsprintfA
GetMenuItemCount
GetMenuItemID
AdjustWindowRectEx
GetSubMenu
GetMenu
GetSysColor
UpdateWindow
MapWindowPoints
GetTopWindow
GetMessagePos
GetMessageTime
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
WinHelpA
GetCapture
RegisterWindowMessageA
IsDialogMessageA
TabbedTextOutA
DrawTextA
GrayStringA
ClientToScreen
BeginPaint
EndPaint
RegisterClassA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
DestroyMenu
SetMenuItemBitmaps
GetFocus
GetNextDlgTabItem
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
ValidateRect
PeekMessageA
GetCursorPos
GetWindowLongA
GetParent
GetLastActivePopup
IsWindowEnabled
SetCursor
UnhookWindowsHookEx
PostQuitMessage
PostMessageA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
GetWindowPlacement
GetWindowRect
GetWindow
ReleaseDC
GetDC
CopyRect
CreateDialogIndirectParamA
DestroyWindow
EndDialog
IsWindow
FindWindowA
MessageBoxA
GetWindowLongPtrA
SetWindowLongPtrA
ExitWindowsEx
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SystemParametersInfoA
SetActiveWindow
SetForegroundWindow
LoadStringA
SetDlgItemTextA
GetDlgItem
SetWindowTextA
SendDlgItemMessageA
SetFocus
ShowWindow
GetSystemMetrics
EnableWindow
LoadIconA
GetClientRect
IsIconic
SendMessageA
DrawIcon
UnregisterClassA
PathCombineA
PathRemoveExtensionA
PathAddExtensionA
SHDeleteKeyA
PathAppendA
SetupOpenInfFileA
SetupCloseInfFile
SetupGetLineTextA
NetUserGetInfo
NetApiBufferFree
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ord17
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetStockObject
SelectObject
DeleteDC
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
ClosePrinter
DocumentPropertiesA
OpenPrinterA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ