Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
40a40c3beece474b2be3398fc841650b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
40a40c3beece474b2be3398fc841650b.exe
Resource
win10v2004-20231215-en
Target
40a40c3beece474b2be3398fc841650b
Size
137KB
MD5
40a40c3beece474b2be3398fc841650b
SHA1
52dc759453f31ad4ed2356ada492625824732ec5
SHA256
05820eb428979eba29b973514cde3f1e33551c97824d479a2406585b00ab8bf4
SHA512
75c9b665cfb6f63f0a58a0acdecf2f562c2291a350f40bdbd16f6da9d1f7221476da6e6cb44f625d1c33c504c503b625dd1874241f3c05b3336156e768dc88de
SSDEEP
3072:Ul3bZJJSDl5UhTJJniIhmE9IDZJ6+dUyT4gVM3hHs1MPw1t449:UlzJu2TJZIE9MZJ6E43hHs1MPw1t44
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PathRemoveFileSpecW
PathAppendW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentProcess
FindResourceExW
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadResource
LockResource
SizeofResource
FindResourceW
Sleep
FreeLibrary
LoadLibraryW
OpenProcess
WaitForMultipleObjects
GetCommandLineW
SetLastError
EnterCriticalSection
LeaveCriticalSection
SetEvent
WaitForSingleObject
CreateMutexW
CreateEventW
CreateThread
GetCurrentThreadId
FlushInstructionCache
LocalFree
SetDllDirectoryW
HeapDestroy
GetLastError
RaiseException
CloseHandle
DecodePointer
TlsFree
GetStartupInfoW
VirtualAlloc
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
OutputDebugStringW
SetFilePointerEx
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetConsoleMode
GetConsoleCP
GetStringTypeW
LCMapStringW
RtlVirtualUnwind
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetFileType
GetStdHandle
VirtualFree
LoadLibraryExA
EncodePointer
ExitThread
LoadLibraryExW
IsDebuggerPresent
IsProcessorFeaturePresent
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RtlCaptureContext
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteKeyW
StringFromGUID2
CoReleaseServerProcess
CoAddRefServerProcess
CoResumeClassObjects
CoRevokeClassObject
CoRegisterClassObject
CoInitializeEx
CoUninitialize
CoCreateInstance
SysStringLen
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
SysFreeString
SysAllocString
LoadCursorW
SetWindowLongPtrW
GetWindowLongPtrW
CharNextW
CharUpperW
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
PostQuitMessage
PostThreadMessageW
DispatchMessageW
TranslateMessage
GetMessageW
GetWindowThreadProcessId
PostMessageW
FindWindowW
UnregisterClassW
RegisterWindowMessageW
DefWindowProcW
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ