Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
typer-shark-deluxe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
typer-shark-deluxe.exe
Resource
win10v2004-20240221-en
Target
typer-shark-deluxe.exe
Size
5.4MB
MD5
f54c13cd655be96e709fbb81ca3f28c0
SHA1
a942118ba6bcc53f25d19b7444f9389d879a91fa
SHA256
10117c49accb800175d2e055eb08314e04e2bf8a7535f2dee95454473dbe81c0
SHA512
5e8f17149f7276f84bd59f30ade9654b32b6f18dd11fdc333357a04a99686d1a6d658e92ad532157bd9e37c0d32201caec346e8c6ae8c70191c2a4db4ca429e3
SSDEEP
98304:Q1iZF2rVXlOvyJ6XgpOtzGzIl/R/LJ2OouSkLxqA/O5FsiJtd+nGR/hMT9c4:QQZ6V1OKJ+gpOVG+Tg1Jb3JIG5hMTO
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord17
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
LoadLibraryA
GetDiskFreeSpaceA
GetModuleFileNameA
GetModuleHandleA
GetVersionExA
LocalFree
DeleteFileA
InterlockedDecrement
FindFirstFileW
LoadLibraryExW
FindClose
FindNextFileW
ExpandEnvironmentStringsW
CompareStringW
CompareStringA
GetLocaleInfoW
SetEndOfFile
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CloseHandle
ResetEvent
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetFileAttributesA
GetOEMCP
GetACP
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetHandleCount
HeapSize
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
GetFileType
VirtualAlloc
CopyFileA
GetProcAddress
GetLastError
MultiByteToWideChar
MulDiv
GetExitCodeProcess
CreateEventA
Sleep
GetWindowsDirectoryA
SetEvent
WaitForSingleObject
FreeLibrary
GetSystemDirectoryA
WideCharToMultiByte
GetSystemTimeAsFileTime
LocalFileTimeToFileTime
SetFileAttributesA
SetFileTime
CreateFileA
DosDateTimeToFileTime
SetEnvironmentVariableA
lstrlenA
CreateDirectoryA
FlushFileBuffers
VirtualFree
HeapCreate
HeapDestroy
GetStringTypeW
RemoveDirectoryA
GetStringTypeA
LCMapStringW
LCMapStringA
GetCPInfo
HeapReAlloc
RtlUnwind
RaiseException
GetStartupInfoA
GetProcessHeap
GetCommandLineA
ExitProcess
FindFirstFileA
FindNextFileA
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ReadFile
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
ExitThread
ResumeThread
CreateThread
SetWindowPos
EndDeferWindowPos
LoadStringW
EndPaint
SetTimer
SendDlgItemMessageA
FillRect
KillTimer
DrawTextA
DrawIconEx
DialogBoxParamW
GetClientRect
SendMessageA
BeginPaint
GetDC
DrawFocusRect
GetWindowTextA
DestroyIcon
GetWindowTextW
CreateWindowExA
ReleaseDC
IsWindowUnicode
GetDlgItem
EndDialog
GetDesktopWindow
GetSysColor
GetWindowLongA
EnumChildWindows
GetSysColorBrush
IsDlgButtonChecked
AdjustWindowRectEx
DeferWindowPos
MessageBoxW
BeginDeferWindowPos
GetSystemMetrics
SetWindowTextA
LoadImageA
SendMessageW
MapWindowPoints
EnableWindow
DialogBoxParamA
SetWindowTextW
GetTextExtentPoint32W
SetTextColor
DeleteDC
CreateFontA
GetDeviceCaps
SetBkColor
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
GetTextMetricsA
GetObjectA
GetStockObject
CreateSolidBrush
BitBlt
RegQueryValueExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegCreateKeyExA
RegCreateKeyA
RegSetValueExA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteExA
SHBrowseForFolderW
CoUninitialize
StringFromGUID2
CoInitializeSecurity
CoCreateGuid
CoInitialize
CoCreateInstance
SysFreeString
SysAllocString
VariantInit
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ