Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
9cd40d43fab11672598b673937099710N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9cd40d43fab11672598b673937099710N.exe
Resource
win10v2004-20240802-en
Target
9cd40d43fab11672598b673937099710N.exe
Size
1.1MB
MD5
9cd40d43fab11672598b673937099710
SHA1
d90eb49e71195e37305a1bf75ecd4788c0bac144
SHA256
d5ab885c049b273053d986fdfe9e588a547d0c7f2109face2ce847f71b4399ef
SHA512
73acab0ac90640e4ab3e05486702bc990e07a6df028bd4e0006e1e44c73ed38a8e0642fdd41b6bbcdf8f30d967563d31b76dbe7f2f32a1b14c90b93c03b0bc98
SSDEEP
24576:lEImVqbf5DghV/WkR8lH4rRlWvwfZOrx7uxeh:tmVqchVTb/fZux7keh
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReadFile
CloseHandle
ConnectNamedPipe
lstrcmpW
CreateMutexW
CreateEventW
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
CreateProcessW
GetCommandLineW
SetCurrentDirectoryW
CreateDirectoryW
CreateFileW
GetFileAttributesW
CreateNamedPipeW
WaitNamedPipeW
CancelIo
GetComputerNameW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
GetConsoleWindow
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DecodePointer
CreateSemaphoreW
GetTickCount
GetStartupInfoW
SetEndOfFile
WriteFile
SetEnvironmentVariableA
ReadConsoleW
WriteConsoleW
SetStdHandle
Sleep
WaitForMultipleObjects
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetErrorMode
GetOverlappedResult
GetLastError
RaiseException
GetExitCodeProcess
TerminateProcess
GetCurrentProcess
OpenProcess
LocalFree
GetProcAddress
FreeLibrary
InterlockedDecrement
FindResourceExW
FindResourceW
SizeofResource
LoadResource
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
GetTimeZoneInformation
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
SetProcessAffinityMask
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
FreeEnvironmentStringsW
DeleteTimerQueueTimer
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
HeapDestroy
WaitForMultipleObjectsEx
LockResource
SetConsoleCtrlHandler
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
GetFileType
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
LoadLibraryExW
lstrlenA
lstrlenW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetStringTypeW
DuplicateHandle
GetCurrentThread
GetExitCodeThread
GetSystemTimeAsFileTime
EncodePointer
IsProcessorFeaturePresent
RtlUnwind
ExitProcess
GetModuleHandleExW
AreFileApisANSI
FatalAppExitA
TryEnterCriticalSection
CreateTimerQueue
RtlCaptureStackBackTrace
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
ExitThread
GetClassNameW
GetWindowThreadProcessId
SendMessageTimeoutW
UnregisterClassW
EnumWindows
EnumChildWindows
CharLowerBuffW
RegisterWindowMessageW
CryptReleaseContext
GetTokenInformation
ConvertSidToStringSidW
CryptDuplicateKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptExportKey
CryptDestroyKey
CryptDeriveKey
CryptGenKey
OpenProcessToken
CryptAcquireContextW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountNameW
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
IsValidSid
SHGetFolderPathW
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CLSIDFromString
CoCreateInstance
CoUninitialize
VarBstrCmp
VariantClear
VariantInit
SysAllocStringByteLen
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
PathMakePrettyW
PathAppendW
PathCombineA
PathCombineW
PathFileExistsW
PathRemoveFileSpecW
PathRemoveArgsW
PathRemoveExtensionW
PathStripPathW
PathUnquoteSpacesW
CryptStringToBinaryA
CryptBinaryToStringA
WinHttpReadData
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpSendRequest
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetModuleFileNameExW
DestroyEnvironmentBlock
CreateEnvironmentBlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ