Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
c908f995031bacf330b55f977578ba52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c908f995031bacf330b55f977578ba52.exe
Resource
win10v2004-20231222-en
Target
c908f995031bacf330b55f977578ba52.bin
Size
2.3MB
MD5
c908f995031bacf330b55f977578ba52
SHA1
17b4e9e5789561cb00435ec8eceb00531ff6d761
SHA256
4285f65fbd7b4035358e3c93c35c88546991f1b2201e0aa3fd585c55de43de62
SHA512
4fc57c72600721486ef46e4c7abd4c982796bfb86c5a296e5afa908f5300d585e4c2fcfef3058cd2754ad07a70f567692e60dca12b7becfa0f2527f4683f7f23
SSDEEP
49152:wt0NuzdxPlG2/UTUDo97U+9JY+4aAiLPDi:Aq7DJYFniLe
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
FlushInstructionCache
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
GetVersionExW
SetLastError
RaiseException
CreateDirectoryW
CreateFileW
LocalFree
FreeLibrary
GetModuleHandleW
lstrcmpiW
FindResourceW
LoadLibraryExW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetFileAttributesExW
SetEndOfFile
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
WriteConsoleW
OutputDebugStringW
EnumSystemLocalesEx
IsValidLocaleName
LCMapStringEx
GetUserDefaultLocaleName
CompareStringEx
GetDateFormatEx
GetCurrentProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount64
HeapReAlloc
SetEnvironmentVariableA
Sleep
GetExitCodeProcess
TerminateProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SetStdHandle
GetTimeZoneInformation
FileTimeToSystemTime
GetDriveTypeW
FindFirstFileExW
FindClose
FileTimeToLocalFileTime
DeleteFileW
FlushFileBuffers
GetConsoleCP
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
SetFilePointer
GetModuleHandleA
GetModuleFileNameA
LockResource
SizeofResource
LoadResource
FreeResource
FindResourceA
HeapFree
HeapAlloc
GetProcessHeap
CreateEventA
SetEvent
GetTimeFormatEx
CreateProcessA
WaitForSingleObject
QueryPerformanceCounter
GetProcAddress
GetCurrentDirectoryW
LoadLibraryW
CloseHandle
SetNamedPipeHandleState
GetLastError
ExitThread
ReadFile
WriteFile
WaitNamedPipeA
CreateFileA
RemoveDirectoryA
MultiByteToWideChar
WideCharToMultiByte
InitializeSListHead
InterlockedPopEntrySList
GetStartupInfoW
InitOnceExecuteOnce
GetFileType
CreateThread
GetStdHandle
HeapSize
TlsFree
TlsSetValue
GetCPInfo
RtlUnwindEx
InterlockedPushEntrySList
TlsGetValue
TlsAlloc
ResumeThread
ResetEvent
OpenEventA
FormatMessageA
MoveFileExW
CopyFileW
CreateDirectoryExW
DeviceIoControl
GetFileAttributesW
FindNextFileW
FindFirstFileW
VirtualFree
EncodePointer
DecodePointer
InitializeCriticalSectionEx
GetLocaleInfoEx
GetStringTypeW
GetSystemTimeAsFileTime
GetConsoleMode
ReadConsoleW
IsDebuggerPresent
IsProcessorFeaturePresent
GetCurrentProcessId
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetCommandLineW
RtlPcToFileHeader
RtlLookupFunctionEntry
VirtualAlloc
UnregisterClassW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
SetTimer
EnableWindow
MessageBeep
MessageBoxA
LoadCursorW
GetClassInfoExW
RegisterClassExW
GetActiveWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetParent
MapWindowPoints
SetWindowPos
SendMessageTimeoutA
RedrawWindow
CallWindowProcW
GetWindowLongPtrW
SetWindowLongPtrW
CreateWindowExW
ShowWindow
GetWindow
GetTopWindow
MoveWindow
KillTimer
GetWindowRect
PostQuitMessage
DestroyWindow
DefWindowProcW
EndPaint
BeginPaint
SetRect
SendMessageW
LoadBitmapW
FillRect
DrawTextA
CopyRect
IsWindowEnabled
InvalidateRect
GetClientRect
SendMessageA
CreateSolidBrush
BitBlt
GetObjectW
DeleteObject
CreateCompatibleDC
SetTextColor
SetBkColor
SelectObject
SetBkMode
DeleteDC
CreateFontIndirectA
GetOpenFileNameW
GetSaveFileNameW
SetSecurityInfo
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
FreeSid
SetEntriesInAclW
AllocateAndInitializeSid
GetSecurityInfo
RegSetKeyValueA
RegCloseKey
RegEnumKeyExA
RegGetValueA
RegCreateKeyExA
ShellExecuteA
OleUninitialize
OleInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoInitialize
CoCreateInstance
CoTaskMemFree
VarUI4FromStr
InitCommonControlsEx
GdiplusShutdown
GdiplusStartup
GdipFillPath
GdipFillRectangleI
GdipDrawPath
GdipSetPageUnit
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipAddPathArcI
GdipClosePathFigure
GdipResetPath
GdipDeletePath
GdipCreatePath
GdipSetPenMode
GdipDeletePen
GdipCreatePen1
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipAlloc
GdipFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ