Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
c14191916e2e3e1ba0b34c4676ceec59.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c14191916e2e3e1ba0b34c4676ceec59.exe
Resource
win10v2004-20240226-en
Target
c14191916e2e3e1ba0b34c4676ceec59
Size
1.4MB
MD5
c14191916e2e3e1ba0b34c4676ceec59
SHA1
5192f54079ba26d7a976c3336dd342f84b66b9fe
SHA256
9845703f9cb377a4309ef4016d3c84749883991d5f4b03650096ea89912b19e6
SHA512
747992f5e29ed4635c28d90402247acef90db3846ca34d666552d475db6d139f0103dc362b71812985b63e478189edbb96f2cc7c7228e0a1fc6b0c5b4287cb53
SSDEEP
24576:dkC1qgrLUjxoCHs0cDKZLC9shUqrX68egMoGuvp99i3bBFzvTieETl2b11pm:R1GjxPM0xC9erXxMoTBivGBTkZ1Y
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTempPathA
CreateDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
DeleteFileA
RemoveDirectoryA
Sleep
GetTickCount
SetUnhandledExceptionFilter
FindResourceExA
WideCharToMultiByte
SetFilePointer
CreateThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
WaitNamedPipeA
ReadFile
CreateNamedPipeA
ConnectNamedPipe
SetNamedPipeHandleState
WriteFile
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
LCMapStringA
GetCurrentProcessId
QueryPerformanceCounter
CreateFileA
SizeofResource
LockResource
LoadResource
FindResourceA
GetCurrentProcess
Process32Next
CloseHandle
Process32First
DisconnectNamedPipe
CreateToolhelp32Snapshot
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleHandleA
LCMapStringW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetModuleFileNameA
GetStdHandle
HeapCreate
VirtualAlloc
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
DeleteCriticalSection
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
VirtualFree
ScreenToClient
GetSystemMetrics
LoadImageA
SendMessageA
GetDlgItem
ReleaseDC
SetWindowPos
GetWindowRect
MoveWindow
SetTimer
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowTextA
UpdateWindow
ShowWindow
CreateDialogParamA
PostQuitMessage
DefWindowProcA
MessageBoxA
DestroyWindow
GetDC
GetDeviceCaps
InitializeSecurityDescriptor
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetSecurityDescriptorDacl
SHGetSpecialFolderPathA
PathAppendA
InternetCloseHandle
InternetOpenA
HttpOpenRequestA
InternetQueryOptionA
InternetSetOptionA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
InternetConnectA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ