Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
8fb5b8d623875952af35dedc9988ac0c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8fb5b8d623875952af35dedc9988ac0c.exe
Resource
win10v2004-20231222-en
Target
8fb5b8d623875952af35dedc9988ac0c
Size
869KB
MD5
8fb5b8d623875952af35dedc9988ac0c
SHA1
0bba3f57c1abc80c7ccf63c087a2a13d859e3243
SHA256
9a203bc8a0e6f564f5172d02a63efd6d7d9a9c1f4ae942496ed961f8623bd9a1
SHA512
bedbba995950d9ff13efaa3c97ed1f862c55c1055b3bdc0b14932f40d51441f2f055d8a4314fd362edd83b2536fbac3c09a9746331f2f88db2382563252f1691
SSDEEP
24576:417Ov6+uv4YwDVmRBe/5ma82ncoCjjgy:4cruv4hVmRlarncoOgy
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHRegCreateUSKeyA
StrIsIntlEqualA
UrlGetLocationA
SHRegWriteUSValueA
PathIsFileSpecA
PathFindOnPathA
SHIsLowMemoryMachine
PathIsUNCA
HashData
PathFileExistsA
StrCSpnA
SHCreateStreamWrapper
SHDeleteValueA
ColorHLSToRGB
StrSpnA
StrChrIA
SHAutoComplete
UrlIsOpaqueA
UrlCombineA
StrRChrIA
AssocQueryStringA
StrFormatByteSize64A
PathStripToRootA
PathGetDriveNumberA
PathQuoteSpacesA
PathAppendA
PathIsRelativeA
PathMakePrettyA
PathCommonPrefixA
PathRemoveBlanksA
VirtualProtectEx
UnhandledExceptionFilter
GetProcessShutdownParameters
ReadProcessMemory
PurgeComm
GetPrivateProfileSectionNamesA
CallNamedPipeA
TransactNamedPipe
SetConsoleActiveScreenBuffer
GlobalFindAtomA
GetTapeStatus
SetConsoleCursorPosition
FindAtomA
GetDefaultCommConfigA
ContinueDebugEvent
Heap32First
GetTapeParameters
GetVersionExA
CreateNamedPipeA
GetProcessVersion
GetDiskFreeSpaceA
QueueUserAPC
SearchPathA
OpenProcess
GetTempPathA
Process32Next
IsDBCSLeadByteEx
LocalAlloc
lstrcpyn
LocalShrink
GetOverlappedResult
SetCommBreak
FreeLibrary
GetCommModemStatus
DebugActiveProcess
GetSystemTimeAdjustment
GlobalLock
GlobalUnlock
ResetEvent
HeapWalk
DeleteAtom
IsBadWritePtr
SetEvent
SetProcessShutdownParameters
GlobalAddAtomA
TlsFree
ExitProcess
WriteConsoleInputA
LoadLibraryA
GetWindowsDirectoryA
MapViewOfFile
TlsSetValue
SizeofResource
GetCPInfoExA
SetStdHandle
GetSystemDirectoryA
WaitForSingleObject
RequestDeviceWakeup
SetCommMask
OutputDebugStringA
CryptSetKeyParam
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ