Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
89d518f9325ad304c1f43d24e04284d6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
89d518f9325ad304c1f43d24e04284d6.exe
Resource
win10v2004-20231222-en
Target
89d518f9325ad304c1f43d24e04284d6
Size
2.5MB
MD5
89d518f9325ad304c1f43d24e04284d6
SHA1
89d32c7ca185f3f28526949d92b4e464665bf105
SHA256
1a75b7847d639d2a1a127f1853f74586956c3a72c887fb75a4beb773c05adf29
SHA512
495aa7e5400f76bd98dde2109366af8cbcd49fd97f2650348d267da45f1e5b106c2f58cdb86d7b7bd07dbe6aa83184dff81e5c0db04de7568b8fb7fc6bc5262e
SSDEEP
49152:iS1wdRCLtoVP2jm9wjAlTEImRydoMn2KVhokJ8/hRNp7AQR0ryjmSt:B1wdRCLtoVOOKr0PnxoUohyQRWami
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CompareStringW
GetProcessHeap
SetEndOfFile
CreateFileW
WriteConsoleW
SetStdHandle
LoadLibraryW
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetLocaleInfoW
GetStringTypeW
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetTimeZoneInformation
ExitProcess
GetConsoleMode
GetConsoleCP
WriteFile
SetFilePointer
ReadFile
HeapCreate
GetFileType
InitializeCriticalSectionAndSpinCount
MoveFileA
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetModuleHandleW
HeapSize
IsProcessorFeaturePresent
IsDebuggerPresent
CopyFileA
SetFileTime
CreateFileA
CreateThread
DeleteFileA
GetTempPathA
GetCurrentProcessId
CloseHandle
DeleteCriticalSection
GetModuleHandleA
GetModuleFileNameA
FlushFileBuffers
LockResource
OpenMutexA
LoadLibraryA
GetPrivateProfileStringA
EnterCriticalSection
GetProcAddress
SetLastError
GetLastError
FindFirstFileA
CreateDirectoryA
LeaveCriticalSection
SizeofResource
Sleep
TerminateThread
OutputDebugStringA
GetPrivateProfileIntA
InitializeCriticalSection
GetSystemWow64DirectoryA
GetCommandLineA
GetWindowsDirectoryA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
HeapAlloc
RtlUnwind
GetCPInfo
RaiseException
GetStartupInfoW
HeapSetInformation
HeapFree
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
MultiByteToWideChar
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
GetCurrentProcess
LoadResource
FindResourceA
GetStdHandle
SetEnvironmentVariableA
KillTimer
SetTimer
GetWindowThreadProcessId
MessageBoxA
EnumWindows
SendMessageA
LoadIconA
GetClassNameA
MoveWindow
LoadCursorA
UpdateWindow
SetWindowTextA
GetSystemMetrics
SystemParametersInfoA
GetDC
IsWindow
GetActiveWindow
ShowWindow
DefWindowProcA
CreateWindowExA
TranslateMessage
IsDialogMessageA
SetFocus
SetForegroundWindow
PostQuitMessage
RegisterClassExA
GetMessageA
DestroyWindow
ModifyMenuA
DestroyMenu
InvalidateRect
ReleaseDC
DispatchMessageA
EndPaint
ClientToScreen
GetWindowRect
TrackPopupMenu
FillRect
SetCapture
LoadBitmapA
BeginPaint
GetUpdateRect
GetCursorPos
CreatePopupMenu
ReleaseCapture
InsertMenuA
DeleteDC
AddFontResourceExA
GdiFlush
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
SetTextColor
CreateFontA
SetBkMode
GetStockObject
CreateSolidBrush
BitBlt
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
Shell_NotifyIconA
ShellExecuteA
GdipDrawImageRectI
GdipDrawImageRectRect
GdiplusShutdown
GdipGetImageWidth
GdipCloneImage
GdipCreateFromHDC
GdipCreateImageAttributes
GdipDisposeImage
GdipAlloc
GdipDisposeImageAttributes
GdipLoadImageFromFile
GdipDeleteGraphics
GdipGetImageHeight
GdipSetImageAttributesColorMatrix
GdipFree
GdiplusStartup
ImageList_Add
ImageList_ReplaceIcon
InitCommonControlsEx
ImageList_Create
recv
setsockopt
htons
socket
WSAStartup
inet_ntoa
connect
closesocket
gethostbyname
inet_addr
send
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ