Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
0fb04314ce56ceb73ab861edec2aa578.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fb04314ce56ceb73ab861edec2aa578.exe
Resource
win10v2004-20231215-en
Target
0fb04314ce56ceb73ab861edec2aa578
Size
1.3MB
MD5
0fb04314ce56ceb73ab861edec2aa578
SHA1
6bb4cd3c12e94bb299c239a529b07d18ad43f8db
SHA256
7e6c1feb601393a9bbc6c18d4a316de4c008105f859882bfbad61fc9cd863231
SHA512
becfc967fe0fe16a254f87f04227b699c77179445764c01e3229a817835223b08e52122468c49ad2beed3c4b4408c0827b612b3eb86565b4c519a28cfb4f6dab
SSDEEP
24576:OY9UvK5ksJaVMT0YtXsr+JLJC9I1aLeRdBzdQa1hweMWymmSqvh1Tw:bUiJLJCli/91hhepJhO
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetOpenA
InternetCrackUrlA
InternetSetCookieA
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
HttpAddRequestHeadersA
InternetSetOptionA
HttpSendRequestA
InternetConnectA
HttpOpenRequestA
GdipDeleteBrush
GdipGetFontCollectionFamilyList
GdipCloneFontFamily
GdipDeleteFontFamily
GdipGetImageHeight
GdipGetFontCollectionFamilyCount
GdipGetImageWidth
GdipPrivateAddMemoryFont
GdipDrawString
GdipCreateSolidFill
GdipSetTextRenderingHint
GdipCreateFont
GdipDisposeImage
GdipSetInterpolationMode
GdipDrawImageRectI
GdipCreateBitmapFromStream
GdipDeleteGraphics
GdipDeletePrivateFontCollection
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipFree
GdipAlloc
GdiplusStartup
GdipDeleteFont
GdipCloneBrush
GdipCreateFromHDC
GdipNewPrivateFontCollection
GdipCloneImage
HeapCreate
HeapDestroy
SetLastError
ExitProcess
GetStringTypeW
GetStringTypeA
GetCPInfo
LCMapStringW
LCMapStringA
CreateMutexA
WaitForSingleObject
ReleaseMutex
CloseHandle
WideCharToMultiByte
lstrlenW
InterlockedExchange
lstrlenA
GetLastError
MultiByteToWideChar
FindResourceA
SizeofResource
LockResource
LoadResource
CreateFileA
SetFilePointerEx
GetFileSizeEx
ReadFile
WriteFile
GetModuleFileNameA
GetTickCount
CopyFileExA
CreateEventA
CreateThread
SetEvent
WaitForMultipleObjects
DeleteFileA
GetLocalTime
GetTempPathA
SetFilePointer
TerminateThread
CreateWaitableTimerA
SetWaitableTimer
RemoveDirectoryA
VirtualFree
FindClose
FindNextFileA
FindFirstFileA
MoveFileA
GetCurrentProcess
GetVersionExA
GetModuleHandleA
CreateProcessA
GetTempFileNameA
GetCommandLineA
Sleep
TerminateProcess
GetExitCodeProcess
LocalAlloc
LocalFree
GetDiskFreeSpaceExA
GlobalFree
GlobalAlloc
InterlockedIncrement
InterlockedDecrement
ResetEvent
GetCurrentThreadId
GlobalLock
GlobalUnlock
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
HeapReAlloc
HeapFree
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
HeapAlloc
InitializeCriticalSection
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
GetACP
VirtualAlloc
GetProcAddress
GetSystemTimeAsFileTime
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
GetStdHandle
SetHandleCount
GetFileType
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
LoadLibraryA
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileW
SetEndOfFile
MoveFileExA
ReleaseCapture
InvalidateRect
SetCapture
DispatchMessageA
PostQuitMessage
SetWindowPos
GetSystemMetrics
GetMessageA
PostThreadMessageA
EndDialog
EndPaint
DrawEdge
PtInRect
SetWindowTextA
GetDlgItem
SetWindowTextW
SetCursor
GetWindowRect
CreateIconFromResource
LoadIconA
RegisterClassExW
CreateWindowExW
SetLayeredWindowAttributes
SetWindowRgn
DefWindowProcW
DialogBoxParamW
GetWindowLongA
SetWindowLongA
DefWindowProcA
ShowWindow
GetClientRect
CreateWindowExA
RegisterClassExA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetClassNameA
EnumChildWindows
GetDlgCtrlID
BeginPaint
LoadCursorA
UnregisterClassA
DestroyWindow
UpdateWindow
MoveWindow
ReleaseDC
GetDC
GetTopWindow
SendMessageA
MessageBoxW
MessageBoxA
GetWindow
CreateRectRgn
CreateRoundRectRgn
SelectClipRgn
CreateDCA
GetTextFaceA
SelectObject
DeleteDC
CreateFontIndirectA
EnumFontFamiliesExA
DeleteObject
GetObjectA
RegOpenKeyExA
GetSidSubAuthority
SetNamedSecurityInfoA
SetEntriesInAclA
CreateWellKnownSid
BuildExplicitAccessWithNameA
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetUserNameA
RegDeleteKeyA
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
ShellExecuteExA
SHGetFolderPathA
SHFileOperationA
ShellExecuteA
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFolderLocation
SHParseDisplayName
SHCreateDirectoryExA
CoCreateInstance
OleInitialize
CreateStreamOnHGlobal
OleCreate
OleSetContainedObject
CoTaskMemFree
OleUninitialize
SysAllocString
VariantClear
SHGetValueA
PathFileExistsA
PathIsRelativeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ