Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
c920fe7c58501226c66701aee5a0b1c7b17c09d61508f1a58a243a2ea56165ea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c920fe7c58501226c66701aee5a0b1c7b17c09d61508f1a58a243a2ea56165ea.exe
Resource
win10v2004-20231215-en
Target
c920fe7c58501226c66701aee5a0b1c7b17c09d61508f1a58a243a2ea56165ea.exe.zip
Size
43.8MB
MD5
7cef507aa4fd25cba9ed60aadd25eed8
SHA1
2c1577ad1c138232c2e4ab04e23422d41e427b66
SHA256
12cdd8b25b6eb31f244973ff1902dc5f304855ffcaebb9fe68c06598b88ca66c
SHA512
1a9f5964aa24301e19699fdf0ff21eb0ac1edc9edf324b2536b743e0057213f57a8f88cc50b8eea0409ec20adb49ca2304db125c9ad8a4076db116bb24c63c1c
SSDEEP
786432:lFrjG9kEdp4JPLqun/T6dyiVPmY6j6yhYCd43Szsyqj5+djOXQcT0QHzmmWU3pHw:lF+9kupAPOun/TIVQYdiQPMBO5/HyypQ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
VerInstallFileA
LoadResource
FindResourceA
GetModuleHandleA
SetErrorMode
CreateDirectoryA
GetModuleFileNameA
CreateFileA
InterlockedIncrement
InterlockedDecrement
QueryPerformanceFrequency
CreateEventA
CloseHandle
WriteFile
Sleep
ReadFile
FreeLibrary
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
lstrcmpA
FindFirstFileA
GetTempPathA
LeaveCriticalSection
EnterCriticalSection
CreateThread
GetWindowsDirectoryA
GetTickCount
GetFileAttributesA
GetTempFileNameA
CreateMutexA
WaitForSingleObject
ReleaseMutex
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
SetEvent
LockResource
SetFilePointer
GetDriveTypeA
OpenEventA
CreateProcessA
CopyFileA
GetCurrentThreadId
HeapAlloc
GetSystemInfo
HeapCreate
GetFileSize
lstrcpynA
lstrcatA
WritePrivateProfileStringA
GetProcAddress
LoadLibraryA
HeapDestroy
GetSystemDefaultLangID
MoveFileA
FindResourceExA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SizeofResource
GetVersion
GetStartupInfoA
ExitProcess
GetCommandLineA
DebugBreak
HeapReAlloc
HeapFree
VirtualQuery
VirtualProtect
SearchPathA
ResetEvent
QueryPerformanceCounter
SystemTimeToFileTime
GetCurrentProcess
GetCurrentThread
RtlUnwind
lstrcpyA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetVersionExA
CompareStringW
CompareStringA
WideCharToMultiByte
lstrlenA
GetLastError
SetLastError
lstrcmpiA
GetPrivateProfileIntA
GetPrivateProfileStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetShortPathNameA
IsBadReadPtr
MoveWindow
KillTimer
DestroyWindow
GetWindowTextA
SetTimer
SetWindowRgn
GetDesktopWindow
DialogBoxIndirectParamA
SetActiveWindow
MsgWaitForMultipleObjects
SetWindowTextA
GetDlgItem
SendMessageA
SetDlgItemTextA
LoadIconA
GetWindowRect
SystemParametersInfoA
SetWindowPos
wsprintfA
PeekMessageA
LoadStringA
CharLowerBuffA
MessageBoxA
EndDialog
CharNextA
CharUpperA
PostThreadMessageA
CreateDialogIndirectParamA
SetForegroundWindow
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
GetDC
ReleaseDC
ShowWindow
ScreenToClient
GetTextExtentPoint32A
LPtoDP
DeleteObject
CreateFontIndirectA
GetObjectA
RegCreateKeyExA
GetTokenInformation
AllocateAndInitializeSid
OpenThreadToken
EqualSid
FreeSid
RegCloseKey
RegOpenKeyExA
RegSetValueExA
OpenProcessToken
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
CoCreateGuid
CoCreateInstance
CoRevokeClassObject
CoRegisterClassObject
StringFromCLSID
CoTaskMemFree
StringFromGUID2
GetRunningObjectTable
CoTaskMemAlloc
CoMarshalInterThreadInterfaceInStream
CoReleaseMarshalData
CoInitialize
CoGetInterfaceAndReleaseStream
CoUninitialize
RegisterTypeLi
LoadTypeLi
LoadRegTypeLi
SysFreeString
VariantCopy
SysAllocStringLen
SysAllocString
SysStringLen
VariantClear
LZOpenFileA
LZCopy
LZClose
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ