Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
1970cd4c79733b34b1ec1cca7ecde1fa.exe
Resource
win7-20231215-en
Target
1970cd4c79733b34b1ec1cca7ecde1fa
Size
1.1MB
MD5
1970cd4c79733b34b1ec1cca7ecde1fa
SHA1
76ed728add76e08f83203944e6ebe8f0a25ca83a
SHA256
f00674585bae4a0f91d0c623563f6390428c3072f95bdc0b13f8868aa1aca685
SHA512
81b2e31f510a38d198924a88c156a5420fe26636a6cb1ea6d44b2ee816d7abc4149b13486d690d157ef553f0fe38babfa761624f3f7ff53468ec7102dcae84ae
SSDEEP
24576:4HYwBA7Vy1S2X+p4J9w+ugWOTE6H3ZSYet6:AYu1VS4J9w+uo3c6
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InternetGetCookieA
InternetCrackUrlA
InternetCheckConnectionA
InternetCloseHandle
InternetOpenA
InternetConnectA
HttpSendRequestA
InternetSetOptionA
HttpOpenRequestA
HttpQueryInfoA
InternetOpenUrlA
InternetReadFile
FindFirstUrlCacheEntryExA
HttpAddRequestHeadersA
FindNextUrlCacheEntryA
FindCloseUrlCache
gethostbyname
socket
closesocket
connect
inet_addr
htons
WSACleanup
WSAStartup
GetPrivateProfileIntA
GetModuleHandleA
WaitForSingleObject
TerminateThread
ResumeThread
Sleep
SetEvent
WaitForMultipleObjects
CreateThread
lstrcpyA
lstrcatA
CreateEventA
GetVolumeInformationA
FreeLibrary
GetProcAddress
LoadLibraryA
CreateDirectoryA
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
CreateMutexA
GetTempPathA
FlushFileBuffers
WriteFile
SetFilePointer
GetTickCount
GetFileAttributesA
GetExitCodeThread
GetExitCodeProcess
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
HeapFree
GetProcessHeap
HeapAlloc
GetCurrentThreadId
FreeResource
MulDiv
SetThreadPriority
CompareFileTime
FileTimeToSystemTime
GetModuleFileNameA
InterlockedIncrement
GetSystemTime
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
SetPriorityClass
OpenProcess
LocalFree
GetSystemInfo
GetCurrentProcessId
CreateToolhelp32Snapshot
Module32First
Module32Next
VirtualQuery
WriteProcessMemory
VirtualProtect
QueryPerformanceCounter
TerminateProcess
IsBadWritePtr
VirtualFree
HeapCreate
DebugBreak
GetCommandLineA
GetStartupInfoA
ExitThread
GetSystemTimeAsFileTime
ExitProcess
RtlUnwind
VirtualAlloc
HeapSize
HeapReAlloc
HeapDestroy
GetOEMCP
GetCPInfo
LCMapStringA
LCMapStringW
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
CompareStringW
CompareStringA
UnmapViewOfFile
GetFileSize
CreateFileMappingA
MapViewOfFileEx
ReadFile
CreateFileA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
CloseHandle
TlsAlloc
SetLastError
TlsFree
TlsSetValue
FindResourceExA
TlsGetValue
GetStringTypeA
GetStringTypeW
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetTimeZoneInformation
UnhandledExceptionFilter
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
InterlockedDecrement
SetUnhandledExceptionFilter
SetScrollRange
SetScrollPos
SetScrollInfo
GetScrollRange
GetScrollPos
EnableScrollBar
GetScrollInfo
SetPropA
GetPropA
GetWindowThreadProcessId
CharNextA
GetMessageA
TranslateMessage
DispatchMessageA
GetSysColor
LoadImageA
CopyRect
OffsetRect
GetWindowDC
ValidateRect
DrawEdge
GetSystemMetrics
InflateRect
DrawFocusRect
CreateDialogParamA
PostQuitMessage
SetForegroundWindow
BringWindowToTop
EnableWindow
ShowScrollBar
IsDialogMessageA
MoveWindow
GetDlgItem
FindWindowExA
ReleaseDC
IsWindowEnabled
GetWindowTextA
DrawTextA
BeginPaint
EndPaint
ClientToScreen
GetWindowRect
PtInRect
RemovePropA
GetActiveWindow
GetSysColorBrush
SetCapture
GetWindow
ReleaseCapture
GetCapture
KillTimer
SystemParametersInfoA
SetTimer
IsWindow
DestroyWindow
UpdateWindow
MessageBoxA
CallWindowProcA
CreateWindowExA
RegisterClassExA
DefWindowProcA
SetWindowRgn
DrawStateA
DrawFrameControl
SetRect
FrameRect
WindowFromDC
GetMessagePos
GetCursorPos
SetCursor
MapWindowPoints
FillRect
LoadBitmapA
LoadCursorA
GetClassInfoExA
AdjustWindowRectEx
GetParent
RedrawWindow
IsWindowVisible
ShowWindow
InvalidateRect
GetDC
ScreenToClient
GetClientRect
SetWindowPos
GetMenu
SetWindowTextA
GetWindowLongA
SetWindowLongA
SendMessageA
GetDesktopWindow
SetParent
wsprintfA
PostMessageA
RegisterWindowMessageA
PeekMessageA
PostThreadMessageA
LoadStringA
UnregisterClassA
GetDlgCtrlID
PlayEnhMetaFile
IntersectClipRect
SelectClipRgn
CreatePatternBrush
SetBrushOrgEx
PatBlt
CreateBitmap
UnrealizeObject
GetCurrentObject
Polygon
SetViewportOrgEx
MoveToEx
LineTo
Rectangle
ExcludeClipRect
CreateCompatibleBitmap
CreateCompatibleDC
SetBkMode
SetTextColor
DeleteDC
CreateSolidBrush
CreatePen
CreateRoundRectRgn
SetBkColor
BitBlt
GetClipBox
LPtoDP
DPtoLP
DeleteObject
GetObjectA
CreateFontIndirectA
GetStockObject
ExtTextOutA
RoundRect
SelectObject
SetWindowOrgEx
GetUserNameA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegFlushKey
RegDeleteValueA
RegDeleteKeyA
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSecurityDescriptorSacl
RegEnumKeyExA
RegQueryInfoKeyA
RegQueryValueExA
ShellExecuteExA
ShellExecuteA
SHGetFolderPathA
CoInitialize
CoTaskMemRealloc
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
OleRun
SysAllocString
VariantClear
VariantInit
SysAllocStringByteLen
SysStringByteLen
VarUI4FromStr
SysFreeString
SysAllocStringLen
SHDeleteKeyA
PathCombineA
PathAppendA
PathAddBackslashA
PathStripPathA
StrToIntA
PathRemoveFileSpecA
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
ImageList_Draw
_TrackMouseEvent
InitCommonControlsEx
ImageList_GetIconSize
TransparentBlt
GradientFill
ImageDirectoryEntryToData
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ