Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
44626c9b7da5f0dc3282377cc7d26c2d83e73c58b94771a13ec1f3cd43785fde.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44626c9b7da5f0dc3282377cc7d26c2d83e73c58b94771a13ec1f3cd43785fde.exe
Resource
win10v2004-20240802-en
Target
44626c9b7da5f0dc3282377cc7d26c2d83e73c58b94771a13ec1f3cd43785fde
Size
2.6MB
MD5
43351c07fa9a4cffd6b37d93800c0841
SHA1
d85ef1b3dbc0740b37e27a7ceefae17ba9f45c4f
SHA256
44626c9b7da5f0dc3282377cc7d26c2d83e73c58b94771a13ec1f3cd43785fde
SHA512
7cccc333f29660e34e5ba4816f740159dbe14b03d6923e54dc9d010f73ede33b153f2eda1b903dd967eaaeede68b5025dab5b39b9bd2d1a3c9e08b62ed730d2f
SSDEEP
24576:mvdGXEXwxIhG6ofAgdiXEXwxIhG6ofAgdCgdZvdGXEXwxIhG6ofAgd:eGXE/IfARXE/IfAT2GXE/IfA
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\DistributedAutoLink\Temp\CompileOutputDir\rsedownloader.pdb
RaiseException
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
WideCharToMultiByte
GetLastError
CreateDirectoryA
lstrcpynA
SetLastError
MoveFileA
lstrcmpiA
FlushFileBuffers
WriteFile
SetEndOfFile
SetFilePointer
SetFileTime
SystemTimeToFileTime
DeleteFileA
SetFileAttributesA
FileTimeToSystemTime
FindClose
FindFirstFileA
GetLocalTime
lstrcatA
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
Sleep
GetCurrentThreadId
IsBadReadPtr
CreateProcessA
InitializeCriticalSection
DeleteCriticalSection
MultiByteToWideChar
lstrlenW
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
LoadLibraryExA
MoveFileExA
ReleaseMutex
CreateMutexA
GetCommandLineA
RemoveDirectoryA
FindNextFileA
ResumeThread
SuspendThread
GetFileAttributesA
WaitForSingleObject
GetStartupInfoA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetTempPathA
GetDiskFreeSpaceA
OutputDebugStringA
GetCurrentProcessId
CopyFileA
GetSystemDirectoryA
GetModuleHandleA
GetProcessHeap
SetEvent
HeapAlloc
HeapReAlloc
HeapSize
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
SetConsoleCtrlHandler
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
InitializeCriticalSectionAndSpinCount
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
CreateFileW
InterlockedExchange
SetStdHandle
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
ExitProcess
GetFileType
GetStdHandle
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
FatalAppExitA
HeapCreate
GetCurrentThread
GetModuleFileNameA
DeviceIoControl
GetWindowsDirectoryA
GetVersionExA
LoadLibraryA
GetProcAddress
GlobalAlloc
GlobalFree
lstrcpyA
FreeLibrary
ReadFile
CreateFileA
GetFileSize
CloseHandle
InterlockedCompareExchange
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetSystemTimeAsFileTime
CreateThread
ExitThread
GetCPInfo
VirtualQuery
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
TerminateProcess
UnhandledExceptionFilter
HeapFree
lstrlenA
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
VirtualProtect
GetModuleHandleW
GetSystemInfo
HeapDestroy
GetClientRect
GetMonitorInfoA
MonitorFromWindow
GetWindowRect
GetWindow
GetParent
PostQuitMessage
LoadMenuA
GetSubMenu
EndDialog
LoadImageA
GetSystemMetrics
DialogBoxParamA
PostMessageA
MapWindowPoints
GetWindowLongA
GetCursorPos
GetActiveWindow
ShowWindow
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
CharNextA
CreateDialogParamA
DefWindowProcA
CharUpperA
wsprintfW
SetWindowPos
SetTimer
KillTimer
IsDialogMessageA
TrackPopupMenu
MessageBoxA
wsprintfA
IsWindow
UnregisterClassA
SendMessageA
SetForegroundWindow
DestroyWindow
ModifyMenuA
DestroyMenu
SetWindowLongA
RegQueryInfoKeyA
OpenProcessToken
GetTokenInformation
RegOpenKeyA
RegCreateKeyA
RegEnumKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
ShellExecuteExA
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
CoInitialize
CoInitializeSecurity
CoTaskMemFree
CoTaskMemAlloc
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElement
SafeArrayDestroy
VariantChangeType
SysAllocStringLen
VarBstrCat
SysStringLen
VariantClear
VariantInit
SysAllocString
SysFreeString
VarUI4FromStr
CreateErrorInfo
GetErrorInfo
SetErrorInfo
PathSkipRootA
PathFileExistsA
PathFindFileNameA
PathRemoveExtensionA
PathRemoveFileSpecA
InitCommonControlsEx
connect
closesocket
send
select
recv
htons
WSACleanup
WSAStartup
ioctlsocket
inet_addr
htonl
ntohs
socket
WSAGetLastError
UuidCreate
InternetSetOptionA
InternetCrackUrlA
InternetOpenA
HttpQueryInfoA
HttpSendRequestA
InternetConnectA
InternetAttemptConnect
InternetCloseHandle
InternetReadFile
InternetSetStatusCallback
HttpSendRequestExA
HttpEndRequestA
InternetSetCookieA
InternetWriteFile
FtpOpenFileA
HttpAddRequestHeadersA
HttpOpenRequestA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ