Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b7f63c9b0a63ef11bf479bf29603a1c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b7f63c9b0a63ef11bf479bf29603a1c0N.exe
Resource
win10v2004-20240709-en
Target
b7f63c9b0a63ef11bf479bf29603a1c0N.exe
Size
1.1MB
MD5
b7f63c9b0a63ef11bf479bf29603a1c0
SHA1
59ef15b2ca1945d36856759950327eaf3e51266f
SHA256
8c5c19cd5a2676ff82edef7b934e862600466f056617ac30adf5b87fa30d28c7
SHA512
0c5c416590ddffe47f9c82cab2860e4aa2f070b46e22e09a244a4fafc742c8f271b67eefb5c4ba201e8b9b4ba042db43b270fd6caf7120247bb07d5fb9198e9f
SSDEEP
24576:XyfNznKKIKB7gCUAXQ0FCJcaUpRRtRlNxHau4e8n:aNzKhCU2plRlNx6Ne8n
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReadFile
CloseHandle
ConnectNamedPipe
lstrcmpW
CreateMutexW
CreateEventW
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
CreateProcessW
GetCommandLineW
SetCurrentDirectoryW
CreateDirectoryW
CreateFileW
GetFileAttributesW
CreateNamedPipeW
WaitNamedPipeW
CancelIo
GetComputerNameW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
GetConsoleWindow
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DecodePointer
CreateSemaphoreW
GetTickCount
GetStartupInfoW
SetEndOfFile
WriteFile
SetEnvironmentVariableA
ReadConsoleW
WriteConsoleW
SetStdHandle
Sleep
WaitForMultipleObjects
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetErrorMode
GetOverlappedResult
GetLastError
RaiseException
GetExitCodeProcess
TerminateProcess
GetCurrentProcess
OpenProcess
LocalFree
GetProcAddress
FreeLibrary
InterlockedDecrement
FindResourceExW
FindResourceW
SizeofResource
LoadResource
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
GetTimeZoneInformation
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
SetProcessAffinityMask
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
FreeEnvironmentStringsW
DeleteTimerQueueTimer
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
HeapDestroy
WaitForMultipleObjectsEx
LockResource
SetConsoleCtrlHandler
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
GetFileType
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
LoadLibraryExW
lstrlenA
lstrlenW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetStringTypeW
DuplicateHandle
GetCurrentThread
GetExitCodeThread
GetSystemTimeAsFileTime
EncodePointer
IsProcessorFeaturePresent
RtlUnwind
ExitProcess
GetModuleHandleExW
AreFileApisANSI
FatalAppExitA
TryEnterCriticalSection
CreateTimerQueue
RtlCaptureStackBackTrace
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
ExitThread
GetClassNameW
GetWindowThreadProcessId
SendMessageTimeoutW
UnregisterClassW
EnumWindows
EnumChildWindows
CharLowerBuffW
RegisterWindowMessageW
CryptReleaseContext
GetTokenInformation
ConvertSidToStringSidW
CryptDuplicateKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptExportKey
CryptDestroyKey
CryptDeriveKey
CryptGenKey
OpenProcessToken
CryptAcquireContextW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountNameW
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
IsValidSid
SHGetFolderPathW
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CLSIDFromString
CoCreateInstance
CoUninitialize
VarBstrCmp
VariantClear
VariantInit
SysAllocStringByteLen
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
PathMakePrettyW
PathAppendW
PathCombineA
PathCombineW
PathFileExistsW
PathRemoveFileSpecW
PathRemoveArgsW
PathRemoveExtensionW
PathStripPathW
PathUnquoteSpacesW
CryptStringToBinaryA
CryptBinaryToStringA
WinHttpReadData
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpSendRequest
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetModuleFileNameExW
DestroyEnvironmentBlock
CreateEnvironmentBlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ