Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
1d80b0ed388bc865c499b79bb4d92539.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1d80b0ed388bc865c499b79bb4d92539.exe
Resource
win10v2004-20231215-en
Target
1d80b0ed388bc865c499b79bb4d92539
Size
1.1MB
MD5
1d80b0ed388bc865c499b79bb4d92539
SHA1
e43825cece5a7a9e8542ffe61f6482d937fe3c66
SHA256
c642cdcc18760971724f1c821425f418aca75e1157e1332a4cb53daf71ce319e
SHA512
f36032461ac804b0b6cd2850292a8ed2e56af5fad2be93df78e0116e6b82fb9e1de3b2b177598f55b3940169e79eb4cc0ba7782e63b5428b99e8e604e8bd1cdc
SSDEEP
24576:CXYd7XF2gmlTBBRonifI7MkjhEbQd9twTbhlPL0cISl/rJ:ntXR8fKiw7MkjhEbQdnQhlPGMDJ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
FreeLibrary
MultiByteToWideChar
CreateFileA
CreateMutexA
OpenMutexA
OutputDebugStringA
GetSystemDirectoryA
ReadFile
GetFileSize
Sleep
GlobalMemoryStatusEx
Process32Next
Process32First
CreateToolhelp32Snapshot
WideCharToMultiByte
CopyFileA
CreateDirectoryA
GetModuleHandleA
IsBadWritePtr
GetCurrentProcess
lstrlenW
WriteFile
TerminateProcess
GetModuleFileNameW
SetFilePointer
CreateFileW
GetCurrentThreadId
FormatMessageW
lstrcatW
LoadLibraryW
GetLocalTime
GetCurrentProcessId
CreateProcessW
GetModuleHandleW
lstrcpyW
GetTickCount
VirtualQuery
IsDebuggerPresent
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
EncodePointer
SetLastError
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
OutputDebugStringW
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameA
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
HeapReAlloc
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetCurrentThread
HeapSize
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
ReadConsoleW
SetStdHandle
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
WriteConsoleW
GetProcessHeap
SetConsoleCtrlHandler
GetTimeZoneInformation
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
IsValidCodePage
InterlockedDecrement
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
WaitForSingleObjectEx
CreateThread
SetEndOfFile
LoadLibraryA
CloseHandle
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
ReadProcessMemory
GetLastError
RaiseException
OpenProcess
GetProcAddress
DecodePointer
GetTempPathW
GetSystemDirectoryW
Process32NextW
Process32FirstW
OpenMutexW
CreateDirectoryW
SetFileTime
GetProcessId
WaitForSingleObject
GetFileAttributesW
SetFileAttributesW
GetFileAttributesExW
FileTimeToSystemTime
GlobalAlloc
DeleteFileW
GlobalFree
MoveFileExW
SystemTimeToFileTime
CopyFileW
GetTempFileNameW
GetFileTime
GetExitCodeProcess
QueryDosDeviceW
FindFirstFileW
RemoveDirectoryW
GetLogicalDriveStringsW
InterlockedCompareExchange
DuplicateHandle
ExitThread
LocalFree
LocalAlloc
CreateMutexW
ReleaseMutex
GetVersionExW
VirtualAlloc
QueryPerformanceFrequency
InterlockedIncrement
SetEvent
OpenFileMappingW
UnmapViewOfFile
FlushViewOfFile
CreateFileMappingW
MapViewOfFile
ResumeThread
FreeLibraryAndExitThread
TerminateThread
LoadLibraryExW
GetOEMCP
FindWindowExW
MonitorFromPoint
GetWindowThreadProcessId
GetWindowLongW
UnregisterClassW
TranslateMessage
SendMessageTimeoutW
PeekMessageW
DispatchMessageW
GetSystemMetrics
SetRectEmpty
MessageBoxW
GetDC
SetWindowPos
MonitorFromRect
UnregisterClassA
ShowWindow
GetMonitorInfoW
wvsprintfW
AttachThreadInput
GetForegroundWindow
GetDesktopWindow
SystemParametersInfoW
GetParent
SetForegroundWindow
IsIconic
GetWindowRect
MsgWaitForMultipleObjectsEx
ReleaseDC
RegQueryInfoKeyW
GetTokenInformation
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
LookupAccountSidW
OpenProcessToken
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegEnumValueW
RegSetValueExW
RegOpenKeyW
RegQueryValueExW
RegDeleteValueW
SetEntriesInAclW
RegCreateKeyExW
RegFlushKey
BuildExplicitAccessWithNameW
RegEnumKeyW
GetLengthSid
AddAccessAllowedAceEx
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorSacl
GetNamedSecurityInfoW
SetNamedSecurityInfoW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ImmDisableIME
InternetOpenA
InternetCloseHandle
InternetConnectA
InternetOpenUrlA
InternetReadFile
HttpQueryInfoA
HttpEndRequestA
HttpOpenRequestA
HttpSendRequestA
InternetSetOptionA
HttpAddRequestHeadersA
GetModuleInformation
GetProcessMemoryInfo
GetDeviceCaps
SHFileOperationW
ShellExecuteExW
ShellExecuteW
SHGetFolderPathW
SHGetSpecialFolderPathW
CoUninitialize
CoInitialize
CoCreateInstance
SysAllocString
SysFreeString
VariantClear
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ