Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
10f450487d8c228993d689f4e6454a7c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10f450487d8c228993d689f4e6454a7c.exe
Resource
win10v2004-20231215-en
Target
10f450487d8c228993d689f4e6454a7c
Size
876KB
MD5
10f450487d8c228993d689f4e6454a7c
SHA1
fbe6df8a6549bc06bb3ac25519f1e73852326ada
SHA256
1221074900d0789d23c02291650a9622edd7a647fb572c355a589b92b3748e00
SHA512
76e1be595cb289aa569a5a5b929315e0c4c7a17021b97c871e35d2078ebd67877cb47c3d208ffc028daabdd6e47e959eeb2043a186c3da08b33d31b9314cb823
SSDEEP
12288:eSpa6TqK3j0uo7+yImCIugZua5UxVcBY59cIiLyBCuiykgkjqZavYkuWvXI0Vt:eSpqK3TwCl1gZu24SYfNPTawku+V
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ArrangeIconicWindows
GetLastActivePopup
SendMessageTimeoutA
ShowCursor
GetClassWord
RegisterDeviceNotificationA
GetAsyncKeyState
DdeQueryStringA
GetScrollBarInfo
GetDoubleClickTime
SetProcessWindowStation
SetCaretBlinkTime
DispatchMessageA
MessageBoxA
GetMenuCheckMarkDimensions
LookupIconIdFromDirectory
OemToCharA
TileWindows
DrawFrame
EnumClipboardFormats
CharToOemBuffA
EnumPropsExA
ChangeMenuA
LoadAcceleratorsA
GetComboBoxInfo
SetWindowRgn
DestroyMenu
FindWindowExA
BringWindowToTop
DrawCaption
DrawMenuBar
DlgDirSelectExA
PackDDElParam
GetMenuItemCount
ShowWindowAsync
GetWindowInfo
CascadeWindows
SetMenuDefaultItem
UnhookWinEvent
SetDoubleClickTime
GetUserObjectSecurity
SendIMEMessageExA
CharNextExA
EndMenu
WinHelpA
GetSystemMenu
GetDC
CheckMenuItem
EnumDisplayMonitors
UnpackDDElParam
GetClassInfoA
SwitchToThisWindow
CreateDialogParamA
GetSidSubAuthority
CopySid
PrivilegeCheck
GetServiceDisplayNameA
GetNumberOfEventLogRecords
OpenEventLogA
GetSecurityDescriptorOwner
QueryServiceObjectSecurity
RegQueryValueA
CryptSignHashA
ChangeServiceConfigA
FindFirstFreeAce
GetTrusteeTypeA
BuildSecurityDescriptorA
CryptDestroyHash
ControlService
SetServiceStatus
RegFlushKey
RegOpenKeyA
GetExplicitEntriesFromAclA
GetSecurityDescriptorControl
CryptContextAddRef
RegConnectRegistryA
CryptGenKey
CryptGetKeyParam
AllocateAndInitializeSid
RegSaveKeyA
EnumDependentServicesA
GetAclInformation
CryptHashSessionKey
BackupEventLogA
RegUnLoadKeyA
InitializeAcl
CryptSetKeyParam
RevertToSelf
CryptEncrypt
AddAce
StrChrIA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ