Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
1792a016351f379497b629d76b4e7ecb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1792a016351f379497b629d76b4e7ecb.exe
Resource
win10v2004-20231215-en
Target
1792a016351f379497b629d76b4e7ecb
Size
6.4MB
MD5
1792a016351f379497b629d76b4e7ecb
SHA1
8f11d3afc13400722bee9305caf1b4871cedf9cc
SHA256
bf9b9bafb1f15a7a17ba66b1d4621bf55a58bc19f3dcf278d91f2b162dae2fcc
SHA512
0bfefc5c616a245cb082d3d499310c9e8663ce653c596afc5504df4fffe87de517bc48f31ea624731fc0a8663e5b79e07b3b39de942a7488f3982023c46b13a7
SSDEEP
98304:fJ9jRtcP0ahSEwdKBaVHJj2ubEsEjMfDtbAEaxVP8rWSK01OEdweF:fJY9sESKB2subEsLZAE4hIWi199F
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
OpenProcess
GetModuleFileNameW
FindResourceW
SizeofResource
LoadResource
LockResource
MoveFileW
GetTickCount
SetThreadPriority
SetDllDirectoryW
WaitForSingleObject
GetExitCodeThread
FreeResource
DeleteFileW
LocalFree
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
GetProcAddress
GetFileAttributesW
MoveFileExW
GetTempPathW
FindFirstFileW
CreateDirectoryW
CopyFileW
FindNextFileW
FindClose
RemoveDirectoryW
GetCurrentProcess
CreateToolhelp32Snapshot
Process32FirstW
lstrcmpiW
TerminateProcess
Process32NextW
SetEndOfFile
WriteConsoleW
SetStdHandle
LoadLibraryW
GetCurrentProcessId
GetCurrentThreadId
OutputDebugStringW
SetFileAttributesW
WriteFile
ReadFile
CloseHandle
CreateFileW
GetLastError
WideCharToMultiByte
GetVersionExW
ReadConsoleW
HeapReAlloc
GetOEMCP
GetACP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
FlushFileBuffers
SetEnvironmentVariableA
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
GetTimeZoneInformation
GetFileType
GetProcessHeap
GetStdHandle
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapAlloc
HeapFree
IsDebuggerPresent
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetCPInfo
CreateThread
ExitThread
LoadLibraryExW
GetCommandLineW
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
CompareStringW
LCMapStringW
GetLocaleInfoW
LookupPrivilegeValueW
RegDeleteValueW
RegCreateKeyExW
RegQueryValueExW
GetUserNameA
RegCloseKey
RegSetValueExW
RegOpenKeyExW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
OpenProcessToken
AdjustTokenPrivileges
ShellExecuteExW
SHCreateDirectoryExW
SHGetFolderPathW
SHFileOperationW
CommandLineToArgvW
ShellExecuteW
CoInitializeEx
CoUninitialize
PropVariantClear
CoCreateInstance
CoInitialize
SysFreeString
SysAllocString
SysStringLen
PathIsRelativeW
PathRemoveFileSpecW
SHStrDupW
StrStrIW
PathFindFileNameW
PathAppendW
PathFileExistsW
StrCmpW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ