Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3f24ee1e0cc5681ade0da92d057acff9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f24ee1e0cc5681ade0da92d057acff9.exe
Resource
win10v2004-20231215-en
Target
3f24ee1e0cc5681ade0da92d057acff9
Size
318KB
MD5
3f24ee1e0cc5681ade0da92d057acff9
SHA1
316af1b3b22629757f0fa080bdfb34703202e5df
SHA256
0682a24f9ebcec532a1aae1d08eeb601c1a05be8550209b40b83faccfba6be18
SHA512
5e5976a783a6245232c4b103410c4579b7f71e39608716c19802d93c0728b453ef2aa7be88b0d15c6822bdb80004b254a9e7e0c1c35e77a0ebd25b28bfc05a52
SSDEEP
6144:t+p9eXlDf1D7LXpYSoozOLiXyokJq5sbDfkF/mPU07:4q1vLZYlozOuiohgDCwU0
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord70
CreateEnvironmentBlock
DestroyEnvironmentBlock
GetFileSizeEx
GetFileTime
GetCurrentProcessId
lstrlenA
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
CompareStringW
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
GetCurrentThreadId
GlobalFlags
CompareStringA
GetSystemTimeAsFileTime
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
Sleep
ExitProcess
GetTimeZoneInformation
HeapCreate
VirtualFree
VirtualAlloc
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentDirectoryA
GetDriveTypeA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateFileA
SetEnvironmentVariableA
FreeLibrary
InterlockedDecrement
GetModuleHandleW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetProcAddress
GetModuleFileNameW
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LoadLibraryW
WideCharToMultiByte
LocalAlloc
FindClose
lstrcmpW
GetFileAttributesW
FindFirstFileW
lstrcmpA
CreateFileW
CopyFileW
CloseHandle
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
SetLastError
lstrlenW
MultiByteToWideChar
GetExitCodeProcess
OpenProcess
GetPrivateProfileStringW
GetProcessHeap
WaitForSingleObject
HeapFree
HeapAlloc
CreateProcessW
SetFileAttributesW
LocalFree
DeleteFileW
LockResource
MoveFileW
GetLastError
GetTempPathW
FormatMessageW
SizeofResource
LoadResource
FindResourceW
PostQuitMessage
SetWindowTextW
ValidateRect
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
IsWindow
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
CheckMenuItem
GetKeyState
SetMenu
DestroyMenu
SetForegroundWindow
GetClientRect
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
CopyRect
PtInRect
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextW
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CharUpperW
GetSystemMetrics
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
GetForegroundWindow
MessageBoxW
GetWindowRect
RegSetValueExW
RegDeleteValueW
DuplicateTokenEx
LookupAccountSidW
CreateProcessAsUserW
RegCreateKeyExW
GetTokenInformation
RegCreateKeyW
OpenProcessToken
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
ShellExecuteW
SHGetFolderPathW
PathStripToRootW
PathFindFileNameW
PathIsUNCW
CryptMsgGetParam
CertCloseStore
CertFindCertificateInStore
CertGetNameStringW
CryptQueryObject
CryptDecodeObject
CryptMsgClose
CertFreeCertificateContext
WinVerifyTrust
LresultFromObject
CreateStdAccessibleObject
GetModuleBaseNameW
EnumProcesses
EnumProcessModules
GetModuleFileNameExW
SetBkColor
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
RestoreDC
SetMapMode
GetClipBox
DeleteObject
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
GetStockObject
SaveDC
SetTextColor
GetDeviceCaps
RectVisible
PtVisible
OffsetViewportOrgEx
OpenPrinterW
DocumentPropertiesW
ClosePrinter
GetFileTitleW
VariantChangeType
VariantClear
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE