Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8f40607dcd83256daf0eb29ed2e64a30N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8f40607dcd83256daf0eb29ed2e64a30N.exe
Resource
win10v2004-20240802-en
Target
8f40607dcd83256daf0eb29ed2e64a30N
Size
220KB
MD5
8f40607dcd83256daf0eb29ed2e64a30
SHA1
e3b7334fc805414b9a2ad28bb098b56b4e2fa9a2
SHA256
196c13661ade5194507c5e342fd3c5f7ee9fd51de4cf2b4d07f2ffc90b5f5289
SHA512
7426a2e919b3a68de60c7e138da17d5e54bc592bfc9f12a62b30ce2caca748098af47bbef60ed360f39a288ff54c0ed6f46d418a597c885a7bdf55f6466307d4
SSDEEP
3072:QBZuqr83ivFnmMEaTFw24CU1PuFiDocENyqUHnROK0gjB8B5+SR7RjoID+kM:6uK83ivvTOp1Pu8DKUkSB8B51c
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
UnmapViewOfFile
GetModuleHandleW
InitializeCriticalSection
OpenProcess
GlobalAlloc
LoadLibraryW
Sleep
LeaveCriticalSection
TerminateProcess
lstrcmpW
lstrlenW
GetLastError
GetProcAddress
EnterCriticalSection
GlobalFree
FindClose
Process32FirstW
LocalAlloc
Process32NextW
OpenFileMappingW
FindNextFileW
CreateToolhelp32Snapshot
DeleteCriticalSection
MapViewOfFile
GetWindowsDirectoryW
DeleteFileW
CreateThread
ReadFile
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
HeapReAlloc
HeapSize
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
GetStringTypeW
FindFirstFileW
OutputDebugStringW
CloseHandle
LoadLibraryExW
RtlUnwindEx
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCurrentProcess
HeapFree
HeapAlloc
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetProcessHeap
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
GetStdHandle
WriteFile
GetModuleFileNameW
RtlPcToFileHeader
RaiseException
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThreadId
GetFileType
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
VirtualAlloc
LoadCursorW
DispatchMessageW
DefWindowProcW
GetSystemMetrics
DestroyWindow
SetTimer
GetMessageW
UnhookWindowsHookEx
wvsprintfW
UnregisterClassW
KillTimer
PostQuitMessage
CallNextHookEx
FindWindowW
TranslateMessage
RegisterClassExW
CreateWindowExW
SetWindowsHookExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
PropVariantClear
CoCreateInstance
CoUninitialize
CoInitialize
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstanceIdW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ