Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
b95cb232c12f70257cdc4e3fc4efbd1d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b95cb232c12f70257cdc4e3fc4efbd1d.exe
Resource
win10v2004-20240226-en
Target
b95cb232c12f70257cdc4e3fc4efbd1d
Size
876KB
MD5
b95cb232c12f70257cdc4e3fc4efbd1d
SHA1
e6b3776f57cadbeefd4c10683e934e7c2d8bd3fb
SHA256
707ef9e539b89ba06da625e77ebd3a11a25cf4fd2744ab785db0aea98f2b8557
SHA512
e9685702b43bdb51c2abfb938450b055b5c1e182a571ad03ae3b817d836166da1063112a6328ace2b53754f8d9a5d03fb6517d66e2b3d8d7de0fc4a5e72e3904
SSDEEP
24576:Q1baeLjvPgNpHRReygVSSRT40RymkOGHqiRACe:QtdvPgNpHRwMmc0raKcY
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
StrRChrIA
PathStripToRootA
AssocQueryStringA
PathGetDriveNumberA
SHRegOpenUSKeyA
PathMakePrettyA
SHDeleteValueA
PathIsRelativeA
PathQuoteSpacesA
StrSpnA
UrlGetLocationA
PathAppendA
HashData
SHRegEnumUSKeyA
PathFindOnPathA
PathSearchAndQualifyA
StrIsIntlEqualA
SHRegWriteUSValueA
UrlIsOpaqueA
ColorHLSToRGB
StrFormatByteSize64A
StrToIntExA
PathIsFileSpecA
UrlCombineA
PathRemoveBlanksA
StrChrIA
StrCSpnA
SHCreateStreamWrapper
PathIsUNCA
SHAutoComplete
GetSystemTimeAdjustment
EnumDateFormatsA
AreFileApisANSI
_hread
GetCommandLineA
lstrcmpi
CallNamedPipeA
UpdateResourceA
FreeConsole
EnumResourceLanguagesA
WriteFileGather
OpenProcess
SetConsoleTextAttribute
GlobalLock
FlushConsoleInputBuffer
DisconnectNamedPipe
GetCommState
GetTempPathA
GetCurrentThreadId
GetProcessHeaps
SetDefaultCommConfigA
CreateDirectoryExA
SetTimeZoneInformation
GetLongPathNameA
LocalLock
SetConsoleCursorPosition
GetProfileStringA
GlobalUnlock
FreeLibrary
FillConsoleOutputAttribute
LockFileEx
SetConsoleOutputCP
InterlockedIncrement
MulDiv
CompareStringA
GetNumberOfConsoleMouseButtons
GetTickCount
BuildCommDCBA
GetCurrentDirectoryA
SetMailslotInfo
GetProcessAffinityMask
CreateFileMappingA
GetFileAttributesExA
GetVersionExA
GetFullPathNameA
SetConsoleActiveScreenBuffer
ReadFileEx
RequestDeviceWakeup
GetSystemDirectoryA
CreateMailslotA
lstrcat
GetComputerNameA
lstrcpy
CreateConsoleScreenBuffer
Module32First
FileTimeToLocalFileTime
ContinueDebugEvent
CreateThread
SearchPathA
Beep
GetExplicitEntriesFromAclA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ