Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
afd1a8180f468857a4fa205714966290N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
afd1a8180f468857a4fa205714966290N.exe
Resource
win10v2004-20240709-en
Target
afd1a8180f468857a4fa205714966290N.exe
Size
1.2MB
MD5
afd1a8180f468857a4fa205714966290
SHA1
564f9faeb1e1f74d28ad276af3ff1a05cf91cc88
SHA256
fdc8edc42644dacef5650a47cd59c29c7ac8c7f84beb2bddc56b54465960316e
SHA512
541b8f6c4dc078ad32ae0aecdc644eb1d9831277009b185670443b260331c9784eccf712cb4ef5bda1dab40d12540d7a77615f94739baec2b537b8eb26448c36
SSDEEP
24576:pMPt3aOIDlyGa+N3eUFFT+ZUBnoE5K05o:py3axzGZ0oE5H5o
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteFileW
FindFirstFileW
FindNextFileW
CopyFileW
MoveFileW
CreateNamedPipeW
WaitNamedPipeW
CancelIo
GetComputerNameW
GetVersionExW
MultiByteToWideChar
TerminateProcess
WriteFile
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetSystemDirectoryW
GetVolumeInformationW
IsValidCodePage
SetFilePointerEx
GetModuleHandleW
GetModuleFileNameW
CancelWaitableTimer
SetWaitableTimer
CreateWaitableTimerW
CreateEventW
OpenMutexW
CreateMutexW
ConnectNamedPipe
CloseHandle
FindClose
ReadFile
Sleep
WaitForMultipleObjects
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
SetErrorMode
GetOverlappedResult
GetExitCodeProcess
GetCurrentProcess
OpenProcess
LocalFree
GetFileAttributesW
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
FindResourceExW
FindResourceW
SizeofResource
LoadResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DecodePointer
LockResource
GetFileType
GetConsoleMode
lstrlenW
lstrlenA
SetEndOfFile
LoadLibraryW
WaitForMultipleObjectsEx
SetEnvironmentVariableA
GetConsoleCP
FlushFileBuffers
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
ReadConsoleW
WriteConsoleW
GetLocaleInfoW
SetStdHandle
GetTimeZoneInformation
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
CreateFileW
GetProcAddress
CreateDirectoryW
SetProcessAffinityMask
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
FreeLibrary
SetConsoleCtrlHandler
GetOEMCP
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
DuplicateHandle
GetCurrentThread
GetExitCodeThread
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
IsProcessorFeaturePresent
RtlUnwind
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetCommandLineW
FatalAppExitA
TryEnterCriticalSection
CreateTimerQueue
RtlCaptureStackBackTrace
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetStartupInfoW
GetTickCount
CreateSemaphoreW
ExitThread
LoadLibraryExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetACP
UnregisterClassW
CryptGetHashParam
SetNamedSecurityInfoW
ConvertSidToStringSidW
CryptDuplicateKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptExportKey
CryptDestroyKey
CryptDeriveKey
CryptGenKey
CryptReleaseContext
CryptAcquireContextW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCreateKeyExW
RegCloseKey
LookupAccountNameW
SetFileSecurityW
MakeAbsoluteSD
MakeSelfRelativeSD
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
GetSecurityDescriptorLength
InitializeSecurityDescriptor
AddAce
GetAclInformation
InitializeAcl
CopySid
GetLengthSid
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
IsValidSid
SHGetFolderPathW
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
VariantClear
SysAllocStringByteLen
SysStringLen
SysAllocString
SysFreeString
GetErrorInfo
VariantInit
VariantChangeType
SetErrorInfo
CreateErrorInfo
PathRenameExtensionW
PathAppendW
PathCombineA
PathFileExistsW
PathMakePrettyW
PathRemoveArgsW
PathRemoveExtensionW
PathCombineW
PathStripPathW
PathUnquoteSpacesW
PathStripToRootW
CryptStringToBinaryA
CryptBinaryToStringA
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
WinHttpQueryHeaders
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ