Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
e0d653d44beae8134c0d67093adbe318.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0d653d44beae8134c0d67093adbe318.exe
Resource
win10v2004-20231215-en
Target
e0d653d44beae8134c0d67093adbe318
Size
113KB
MD5
e0d653d44beae8134c0d67093adbe318
SHA1
161791d50442b6926a52de9408215f19fcd78699
SHA256
e30e37930a7220840f467ace15f0b430df052625d4ad5cdaac28360b2831ab5b
SHA512
b0731960615ca330d6672a4f3b874276e00bffe2a4843d00a008054bc25940e5fe96a1e70d240635389292e14335b879a16a0eb2b72208c89c5dff712778e7ec
SSDEEP
3072:JK0N5HrqWEnO4jOKl6YJkwL+OgZCBL5tcRz:JK0Nptu56eL+FZML5Ez
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
e:\Dev\SuperNodes\TrayIcon\Release\TrayIcon.pdb
lstrlenW
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
SetLastError
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrcmpiA
lstrcatA
CloseHandle
lstrcpyA
lstrcpynA
Sleep
IsDBCSLeadByte
InterlockedIncrement
SetEvent
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetCommandLineA
LocalFree
FormatMessageA
GetExitCodeProcess
CreateProcessA
EnterCriticalSection
FlushFileBuffers
VirtualQuery
GetSystemInfo
VirtualProtect
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetFilePointer
GetCPInfo
GetOEMCP
IsBadCodePtr
IsBadReadPtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
IsBadWritePtr
HeapCreate
HeapDestroy
HeapSize
TerminateProcess
TlsAlloc
GetModuleFileNameA
lstrlenA
LeaveCriticalSection
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
InterlockedExchange
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
TlsGetValue
TlsSetValue
TlsFree
SetUnhandledExceptionFilter
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetModuleHandleA
GetSystemTimeAsFileTime
HeapReAlloc
RtlUnwind
RaiseException
ExitProcess
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcAddress
HeapAlloc
InterlockedCompareExchange
GetProcessHeap
HeapFree
RegisterClassExA
UnregisterClassA
wsprintfA
SetWindowLongA
PostMessageA
UpdateWindow
PeekMessageA
PostQuitMessage
GetMessageA
TranslateMessage
DispatchMessageA
ShowWindow
PostThreadMessageA
FindWindowA
CharUpperA
CharNextA
LoadIconA
CallWindowProcA
GetWindowLongA
CreateWindowExA
IsWindow
DestroyIcon
DefWindowProcA
GetDoubleClickTime
SetTimer
KillTimer
SetForegroundWindow
LoadMenuA
GetSubMenu
EnableMenuItem
GetCursorPos
TrackPopupMenu
DestroyMenu
DestroyWindow
LoadCursorA
GetClassInfoExA
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
Shell_NotifyIconA
CoInitialize
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoUninitialize
StringFromGUID2
CoTaskMemAlloc
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
SysStringLen
LoadTypeLi
LoadRegTypeLi
SysAllocString
VariantClear
VariantInit
SysFreeString
SysAllocStringLen
PathFindExtensionA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ