Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
b9e79c0327749d576f533edf37748f510cf912a324c018b8dddace60fdf02daf.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b9e79c0327749d576f533edf37748f510cf912a324c018b8dddace60fdf02daf.exe
Resource
win10v2004-20240802-en
Target
b9e79c0327749d576f533edf37748f510cf912a324c018b8dddace60fdf02daf
Size
370KB
MD5
c07a3a86710b1ac9ccb69df1933c2a4e
SHA1
4cd9d481111fd5f922bf4f7d0dc574b1b114c49a
SHA256
b9e79c0327749d576f533edf37748f510cf912a324c018b8dddace60fdf02daf
SHA512
9f83309f2cc64099db25254da23b252cb1bc23fa4e518b92fa7f5c1bed628fa64c3bc97689bd52045080d89ed694307de506ebfdcc4479f5fdc3adf1ecb993d4
SSDEEP
6144:LXOYchVAN9UqMqPU1VN899NYVHjUS27TlHJKWCchbFKyB60bQIEK:LXjBXNY1jUbtUWbhbFXH8HK
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetFilePointer
GetFileAttributesA
SetFileAttributesA
GetVolumeInformationA
GetPrivateProfileStringA
lstrcpynA
GlobalFree
GetLocalTime
GetDiskFreeSpaceA
GetVolumeNameForVolumeMountPointA
GetVersionExA
FindNextFileA
SystemTimeToFileTime
GetSystemTime
GetModuleFileNameA
WritePrivateProfileStringA
lstrcmpA
GlobalAlloc
GlobalLock
GlobalUnlock
MultiByteToWideChar
WriteFile
FindFirstFileA
SetEndOfFile
DeleteFileA
CompareStringW
FindClose
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
HeapSize
GetCurrentDirectoryA
GetFullPathNameA
SetEnvironmentVariableA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
InitializeCriticalSection
HeapReAlloc
VirtualAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
CompareStringA
GetPrivateProfileIntA
CopyFileA
CreateFileA
ReadFile
CloseHandle
lstrcmpiA
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
lstrcatA
lstrcpyA
Sleep
ResetEvent
WaitForSingleObject
CreateEventA
SetEvent
GetVersion
GetTickCount
GetLastError
GetModuleHandleA
SetErrorMode
GetWindowsDirectoryA
GetDriveTypeA
GetProcessTimes
GetCurrentProcess
DeviceIoControl
OpenSemaphoreA
CreateSemaphoreA
GetCurrentThread
ReleaseSemaphore
SetThreadPriority
SleepEx
QueryPerformanceCounter
QueryPerformanceFrequency
GetTimeZoneInformation
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapFree
HeapAlloc
TerminateProcess
InterlockedDecrement
InterlockedIncrement
ResumeThread
CreateThread
TlsSetValue
TlsGetValue
ExitThread
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCurrentThreadId
TlsAlloc
SetLastError
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetCurrentProcessId
CharUpperBuffA
CharPrevA
CharNextA
DestroyWindow
PostQuitMessage
SetTimer
RegisterWindowMessageA
GetSysColor
DefWindowProcA
LoadMenuA
GetSubMenu
TrackPopupMenu
DestroyMenu
KillTimer
FindWindowA
RegisterClassA
CreateWindowExA
GetMessageA
DispatchMessageA
keybd_event
SendMessageA
OpenClipboard
SetClipboardData
CloseClipboard
GetCursorPos
IsWindowEnabled
PostMessageA
EnableWindow
SetFocus
DialogBoxParamA
IsClipboardFormatAvailable
GetDlgItemTextA
EndDialog
GetFocus
GetParent
WinHelpA
CreateDialogParamA
MessageBeep
wsprintfA
ShowWindow
SetWindowLongA
GetWindowLongA
GetWindowRect
GetSystemMetrics
SetWindowPos
GetDlgItem
LoadCursorA
SetCursor
SetDlgItemTextA
MessageBoxA
SendDlgItemMessageA
GetStockObject
OpenSCManagerA
QueryServiceStatus
RegEnumKeyA
RegDeleteValueA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CloseServiceHandle
GetUserNameA
RegQueryValueA
RegOpenKeyA
OpenServiceA
Shell_NotifyIconA
ShellExecuteA
Netbios
PropertySheetA
ord17
GetOpenFileNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ