Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
198bb220115446c258b25191334f9ce3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
198bb220115446c258b25191334f9ce3.exe
Resource
win10v2004-20231215-en
Target
198bb220115446c258b25191334f9ce3
Size
1.1MB
MD5
198bb220115446c258b25191334f9ce3
SHA1
58bcd4d0db555ee303ca39296be30af8bf8af5cb
SHA256
12b069f4adda789703c456f097637713e3b330871370f9f61fa2bc1b948966a1
SHA512
89eac87c9a934ed375704b468e7e776897a9a748e035a39a93ea1da0a4f15877c259f36b3dece98abf49534be6e74883a03bd0719af9910d2381aef4ffe17f9f
SSDEEP
24576:fO2FknaZhVCWV6Itu8ET7S5RXpXNJt7kgqSM:fO/aZPUItubTcRXp1FBM
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
DeviceIoControl
GetTickCount
DeleteCriticalSection
InitializeCriticalSection
WriteConsoleW
GetStdHandle
FreeResource
MapViewOfFile
ReleaseMutex
ProcessIdToSessionId
GlobalAlloc
GlobalFree
GetDriveTypeW
SetUnhandledExceptionFilter
VirtualQuery
GetThreadSelectorEntry
GetModuleFileNameW
GetCurrentProcessId
FreeLibrary
GetProcAddress
LoadLibraryW
GetFileSizeEx
GlobalUnlock
GlobalLock
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetDriveTypeA
SetEndOfFile
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
InterlockedIncrement
GetStringTypeW
GetStringTypeA
EnumSystemLocalesA
VirtualQueryEx
FlushFileBuffers
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetCurrentDirectoryA
GetDateFormatA
GetTimeFormatA
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
HeapCreate
ExitProcess
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
LCMapStringW
LCMapStringA
RtlUnwind
GetStartupInfoW
CreateDirectoryW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetSystemTimeAsFileTime
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
GetCurrentThreadId
RaiseException
SetLastError
CreateMutexW
GetVersionExW
GetUserDefaultLCID
CreateFileA
FlushInstructionCache
GetCurrentProcess
OpenMutexW
LeaveCriticalSection
EnterCriticalSection
LocalFree
GetPrivateProfileIntW
GetCurrentThread
IsDBCSLeadByte
GetCPInfo
GetFullPathNameW
OpenFileMappingW
WritePrivateProfileStringW
MulDiv
GetPrivateProfileStringW
SetFileTime
GetSystemTime
CopyFileW
GetFileAttributesW
SetFileAttributesW
VirtualFreeEx
ReadProcessMemory
VirtualAllocEx
OpenProcess
GetVersion
ReadFile
FindNextFileW
DeleteFileW
GetFileTime
FindClose
FindFirstFileW
WaitForSingleObject
WideCharToMultiByte
lstrlenW
Sleep
IsValidLocale
InterlockedDecrement
UnmapViewOfFile
GetLastError
SetFilePointer
WriteFile
SystemTimeToFileTime
GetLocalTime
GetFileSize
CreateFileMappingW
MapViewOfFileEx
CloseHandle
CreateFileW
FindResourceExW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
SetStdHandle
FindResourceW
MessageBoxW
GetCursorPos
OffsetRect
ClientToScreen
GetMessagePos
ScreenToClient
MapVirtualKeyW
GetKeyNameTextW
EnumDisplayMonitors
GetClientRect
PtInRect
KillTimer
InvalidateRect
UnregisterClassA
SetTimer
SetCursor
LoadCursorW
CallWindowProcW
GetDlgItem
SendMessageW
SetWindowTextW
LoadImageW
MoveWindow
UpdateLayeredWindow
PostMessageW
GetWindowLongW
DestroyIcon
SetWindowLongW
SetWindowPos
IsWindowVisible
UpdateWindow
CreateWindowExW
RegisterClassExW
GetClassInfoExW
UnregisterClassW
GetMonitorInfoW
MonitorFromPoint
GetWindowThreadProcessId
SetRectEmpty
FindWindowExW
GetSysColorBrush
CallNextHookEx
CopyRect
GetMenuItemID
DrawTextW
FillRect
WindowFromPoint
MenuItemFromPoint
UnhookWindowsHookEx
SetWindowsHookExW
GetSysColor
SetRect
ReleaseDC
GetDC
DialogBoxParamW
LoadBitmapW
TrackPopupMenu
GetKeyState
GetMenuItemRect
DestroyMenu
GetMenuItemInfoW
LoadIconW
GetMenuItemCount
CheckMenuRadioItem
SystemParametersInfoW
FindWindowW
PostQuitMessage
SetMenuItemBitmaps
AppendMenuW
GetWindowRect
CreateMenu
InsertMenuW
CreatePopupMenu
ModifyMenuW
DestroyWindow
DispatchMessageW
CreateDialogParamW
TranslateMessage
IsDialogMessageW
GetMessageW
ShowWindow
RegisterWindowMessageW
SetForegroundWindow
GetPropW
IsWindow
GetWindow
GetDesktopWindow
EndPaint
BeginPaint
DefWindowProcW
EndDialog
CreateDIBSection
Rectangle
PatBlt
GetDeviceCaps
GetObjectW
BitBlt
CreateCompatibleBitmap
SelectObject
SetPixel
GetPixel
CreatePen
Ellipse
CreateSolidBrush
SetBkMode
CreateFontIndirectW
StretchDIBits
SetStretchBltMode
DeleteDC
SetTextColor
DeleteObject
CreateFontW
CreateCompatibleDC
RegOpenKeyExA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
GetTokenInformation
OpenProcessToken
IsTextUnicode
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
SetEntriesInAclW
BuildExplicitAccessWithNameW
GetSecurityInfo
RegCreateKeyExW
RegSetValueExW
LookupAccountNameW
ConvertSidToStringSidW
LookupAccountSidW
RegQueryValueExA
ShellExecuteW
SHCreateDirectoryExW
SHGetSpecialFolderPathW
ShellExecuteExW
Shell_NotifyIconW
SHGetFolderPathW
CoInitialize
CoCreateGuid
CoUninitialize
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfile
StgOpenStorage
StgOpenStorageOnILockBytes
PathFileExistsW
ord17
TransparentBlt
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
sendto
WSAStartup
WSACleanup
socket
gethostbyname
htons
closesocket
NetApiBufferFree
Netbios
NetWkstaTransportEnum
WTSFreeMemory
WTSQuerySessionInformationW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE