Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
00067462fdac449178c1d101f5bd9ef0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
00067462fdac449178c1d101f5bd9ef0N.exe
Resource
win10v2004-20240802-en
Target
00067462fdac449178c1d101f5bd9ef0N.exe
Size
978KB
MD5
00067462fdac449178c1d101f5bd9ef0
SHA1
23182e84101c4bbe3d353bedbbeeccc8a4cbd9a0
SHA256
7a3ed3ec1e4e9010c60ece6ebefeb5a5a3f8ffc9e285fe4bf5204dcbdb26fd32
SHA512
fe10b4fcc2e359b76aa57ef92f3a6745605047a62e2c8a95ba1187425571addd66ddb4c230c8328bf9109bed0d9609a6c2fca1570255e542b6279f746c2911fa
SSDEEP
12288:rbD3D2AqpOUxrUmzSukM1mgZUa0zIZcp12KM41xUeHR3wWc4T1y/xTB7fN90bvo+:jD2XpOUxrU+oMF0z5p05Mdw81SkbvWQ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTempPathW
FlushFileBuffers
CreateFileW
ReadFile
GetFileAttributesW
HeapValidate
HeapCreate
GetFileAttributesA
GetVersionExW
FormatMessageW
Sleep
LoadLibraryW
WriteFile
FormatMessageA
GetSystemTimeAsFileTime
UnlockFileEx
GetTickCount
OutputDebugStringW
LockFile
UnlockFile
InterlockedCompareExchange
WaitForSingleObject
QueryPerformanceCounter
SystemTimeToFileTime
FreeLibrary
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
SetFilePointer
HeapCompact
CreateMutexW
GetFileSize
CreateFileA
GetFullPathNameA
GetFullPathNameW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
SetFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryW
CreateDirectoryW
InterlockedDecrement
OpenProcess
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
RaiseException
InitializeCriticalSectionAndSpinCount
ReleaseMutex
GetModuleFileNameW
GetModuleHandleW
GetComputerNameW
CreateToolhelp32Snapshot
Process32FirstW
GetProcAddress
GetSystemDirectoryW
GetVolumeInformationW
InterlockedIncrement
GetOverlappedResult
SetErrorMode
SetEvent
ResetEvent
WaitForMultipleObjects
FindClose
ConnectNamedPipe
CreateEventW
CreateWaitableTimerW
SetWaitableTimer
CancelWaitableTimer
RemoveDirectoryW
FindFirstFileW
FindNextFileW
MoveFileExW
CreateNamedPipeW
WaitNamedPipeW
CancelIo
DecodePointer
lstrlenA
LockFileEx
GetDiskFreeSpaceW
LoadLibraryA
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
GetSystemInfo
GetFileAttributesExW
OutputDebugStringA
GetVersionExA
CloseHandle
DeleteFileW
GetCurrentProcessId
GetTempPathA
LocalFree
GetSystemTime
AreFileApisANSI
DeleteFileA
WideCharToMultiByte
MultiByteToWideChar
FindResourceExW
FindResourceW
SizeofResource
LoadResource
GetLastError
LockResource
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
SetEnvironmentVariableA
ReadConsoleW
WriteConsoleW
SetStdHandle
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetFilePointerEx
GetFileType
GetConsoleMode
GetConsoleCP
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
GetStdHandle
HeapAlloc
HeapDestroy
Process32NextW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
IsDebuggerPresent
DuplicateHandle
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
EncodePointer
GetStringTypeW
IsProcessorFeaturePresent
RtlUnwind
ExitProcess
GetModuleHandleExW
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
CreateSemaphoreW
CreateThread
ExitThread
LoadLibraryExW
CreateTimerQueue
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
CryptGetHashParam
GetTokenInformation
IsValidSid
RegEnumValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegEnumKeyExW
ConvertSidToStringSidW
CryptDuplicateKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptExportKey
CryptDestroyKey
CryptDeriveKey
CryptGenKey
CryptReleaseContext
CryptAcquireContextW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
LookupAccountNameW
LookupAccountSidW
OpenProcessToken
SHGetFolderPathW
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
CoUninitialize
SysAllocStringByteLen
SysFreeString
VariantClear
SysAllocString
SysStringLen
PathAppendW
PathFileExistsW
PathUnquoteSpacesW
PathStripPathW
PathRenameExtensionW
PathRemoveFileSpecW
PathRemoveExtensionW
PathRemoveArgsW
PathMakePrettyW
PathIsDirectoryW
PathFindExtensionW
PathFileExistsA
PathCombineW
PathCombineA
StrToIntW
PathStripToRootW
CryptBinaryToStringA
CryptStringToBinaryA
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpConnect
WinHttpOpen
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpCrackUrl
WinHttpOpenRequest
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ