Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
28-03-2024 16:35
240328-t3w5asbf54 8Static task
static1
Target
Fluxus_733197.exe
Size
30.0MB
MD5
b6306d17355e249c63ee6e052a5950c6
SHA1
669dacf44d5cc06f4209bdc2faedd9ce1980e5b1
SHA256
175af219509b55f74dda8e625390db42261fca6b425331ca8978144e6d4c2b02
SHA512
197e0a5b42bc761de93237ea8d8bd13a9becf1c394601b8f81b7385d68926f035fd29197efe6d473a40c02679db380e6f0a17fec0c20193cdebb0f3de9821563
SSDEEP
786432:nrrrr8UhqpakPyTGhTi/btOWVMpmyovt23XuyeK2:MrokqTGhSUWOAyovaHen
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VerifyVersionInfoW
FlushFileBuffers
CreateDirectoryA
GetThreadPriority
PeekNamedPipe
FreeEnvironmentStringsW
FindNextFileA
GetFileSizeEx
SetPriorityClass
LeaveCriticalSection
GetSystemInfo
SetThreadPriority
GetProcessHeap
InterlockedPushEntrySList
DeleteTimerQueueTimer
OutputDebugStringW
InitializeCriticalSection
EnumSystemLocalesW
DuplicateHandle
AcquireSRWLockExclusive
SetLastError
GetSystemDirectoryW
InterlockedPopEntrySList
GetLogicalDriveStringsW
SwitchToThread
WriteFile
TlsGetValue
LCMapStringW
RegisterWaitForSingleObject
RemoveDirectoryA
GetSystemTimeAsFileTime
GetTickCount
CreateFileA
SignalObjectAndWait
lstrlenA
GetVersionExW
Sleep
FindNextFileW
SetFileAttributesA
GetFileAttributesExW
GetLastError
InitializeCriticalSectionEx
LocalFree
GetTickCount64
HeapAlloc
GetCurrentThreadId
SetFilePointer
SetFileTime
GetFileType
FindFirstFileExW
ExitProcess
SetFileAttributesW
GetModuleHandleExW
GetThreadTimes
IsValidLocale
GetEnvironmentVariableA
HeapSize
GetTimeFormatW
InterlockedDecrement
InterlockedExchange
UnregisterWait
LoadLibraryA
GetProcessAffinityMask
GlobalUnlock
VerSetConditionMask
CreateDirectoryW
TlsAlloc
GetFileAttributesA
QueryPerformanceCounter
RaiseException
MoveFileExW
InitializeSListHead
RemoveDirectoryW
GlobalFree
ReadFile
FreeLibraryAndExitThread
GetNumaHighestNodeNumber
GetModuleHandleA
lstrcatA
InterlockedIncrement
FormatMessageA
ReleaseSRWLockExclusive
SetFilePointerEx
DeleteFileA
TlsFree
GetFileInformationByHandle
GetCommandLineW
GetModuleFileNameW
CreateTimerQueue
GetCurrentProcess
GetFileSize
GetCurrentDirectoryW
GetCPInfo
GlobalAlloc
QueryDepthSList
GetFileAttributesW
GlobalMemoryStatus
IsDebuggerPresent
SetThreadAffinityMask
CompareStringW
HeapReAlloc
GetModuleFileNameA
VirtualFree
GetVersionExA
TlsSetValue
LoadLibraryW
InitializeCriticalSectionAndSpinCount
CreateEventW
SetUnhandledExceptionFilter
RtlUnwind
LoadLibraryExW
WaitForSingleObjectEx
AreFileApisANSI
FreeLibrary
GetModuleHandleW
TerminateProcess
SleepEx
SetEvent
GetConsoleCP
ChangeTimerQueueTimer
GetProcAddress
InterlockedFlushSList
MoveFileA
MoveFileW
GetFullPathNameW
ReadConsoleW
GetStringTypeW
GetStdHandle
GetDriveTypeW
FindClose
CreateFileW
GetACP
CreateSemaphoreA
WaitForMultipleObjects
GetOEMCP
FileTimeToSystemTime
GetLogicalDriveStringsA
MultiByteToWideChar
ExitThread
UnregisterWaitEx
GetStartupInfoW
CompareFileTime
GetUserDefaultLCID
GetTimeZoneInformation
GlobalLock
GetDateFormatW
WriteConsoleW
SetEnvironmentVariableA
ResetEvent
GetCurrentDirectoryA
IsValidCodePage
FindFirstFileW
SetEndOfFile
CreateEventA
EncodePointer
GetCommandLineA
GetCurrentProcessId
GetEnvironmentStringsW
SetStdHandle
HeapFree
CreateThread
VirtualAlloc
GetVersion
ReleaseSemaphore
GetCurrentThread
CloseHandle
IsProcessorFeaturePresent
UnhandledExceptionFilter
DeleteFileW
FileTimeToLocalFileTime
WideCharToMultiByte
EnterCriticalSection
DeleteCriticalSection
CreateTimerQueueTimer
FindFirstFileA
WaitForSingleObject
VirtualProtect
QueryPerformanceFrequency
DecodePointer
FormatMessageW
CreateSemaphoreW
GetLocaleInfoW
GetConsoleMode
wsprintfA
InvalidateRect
GetKeyState
ShowWindow
GetWindowRect
SetWindowTextA
MessageBoxA
GetDlgItem
EnableWindow
GetFocus
GetWindowTextW
MapDialogRect
EndDialog
SetWindowLongA
EmptyClipboard
GetWindowTextLengthW
MonitorFromWindow
MessageBoxW
OpenClipboard
SendMessageA
LoadStringW
SystemParametersInfoA
DialogBoxParamW
CloseClipboard
ScreenToClient
GetWindowTextA
LoadIconA
GetWindowTextLengthA
IsDlgButtonChecked
SendMessageW
LoadCursorA
SetTimer
KillTimer
CharUpperA
SetClipboardData
SetCursor
LoadStringA
GetParent
GetWindowLongA
SetFocus
SetWindowTextW
CheckDlgButton
PostMessageA
MoveWindow
CharUpperW
GetMonitorInfoA
DialogBoxParamA
CryptDestroyHash
CryptCreateHash
CryptAcquireContextW
CryptImportKey
CryptEncrypt
CryptHashData
CryptGetHashParam
CryptReleaseContext
CloseServiceHandle
CryptDestroyKey
SHGetSpecialFolderPathW
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
CoInitialize
CoUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
SysStringLen
SysFreeString
VariantClear
SysAllocString
SysAllocStringLen
BCryptGenRandom
CertFreeCertificateChain
CryptDecodeObjectEx
CryptStringToBinaryW
CertEnumCertificatesInStore
CertAddCertificateContextToStore
CertCloseStore
CertCreateCertificateChainEngine
CertGetNameStringW
CertOpenStore
CertFindExtension
CertFreeCertificateChainEngine
CertFindCertificateInStore
CertGetCertificateChain
CertFreeCertificateContext
CryptQueryObject
PFXImportCertStore
ord26
ord145
ord219
ord46
ord14
ord216
ord73
ord208
ord41
ord117
ord27
ord127
ord167
ord142
ord79
ord133
ord147
ord301
WSASetLastError
getsockopt
send
WSAIoctl
freeaddrinfo
WSAEventSelect
WSACloseEvent
WSAResetEvent
WSAWaitForMultipleEvents
closesocket
WSAGetLastError
ntohs
gethostname
WSAStartup
WSACleanup
setsockopt
getaddrinfo
htons
__WSAFDIsSet
select
accept
bind
connect
getsockname
htonl
listen
recv
socket
WSAEnumNetworkEvents
WSACreateEvent
recvfrom
sendto
getpeername
ioctlsocket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ