Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ARCHIVO ADJUNTO TRANSACCIONAL No 1594841511894984184198198196815951.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ARCHIVO ADJUNTO TRANSACCIONAL No 1594841511894984184198198196815951.exe
Resource
win10v2004-20240802-en
Target
ARCHIVO ADJUNTO TRANSACCIONAL No 1594841511894984184198198196815951.exe
Size
2.9MB
MD5
09fb041d9b196e3461b1902814f526d5
SHA1
2fc901f62efd9652e93250bd18b3fe6553841081
SHA256
c7969e2249fc0180887315b88855ce017d4377b6550a2631b3c821f226e9e861
SHA512
e70001d84b1bc8ed3783421834a8b0e042546d36b63991d9553eb325a5d09cc02cde0fb06218bab3205b1c5206fda5275d0449abd30f7600a052ac8ad7a65b35
SSDEEP
49152:uvaC6j7iYXcTURWVyf3ZevYFOntC9aHjZxLueesGLpy1MQq97rt:BaYXBRWVy/ZevQOnF3LueesGLp2y9
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\depot\bas\753_REL\fes_800_REL\src\opt\ntintel\saplgpad.pdb
GetSystemDefaultLocaleName
GetEnvironmentVariableA
GetLocalTime
LocalFree
FormatMessageA
GetCurrentThreadId
Sleep
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
FindResourceA
GetUserDefaultLCID
TerminateProcess
OpenProcess
WideCharToMultiByte
GetACP
CreateFileMappingA
CreateSemaphoreA
FindResourceW
SizeofResource
LockResource
LoadResource
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
FindResourceExW
UnmapViewOfFile
MapViewOfFile
GetVersionExA
CreateProcessA
GetSystemInfo
DecodePointer
GetCurrentProcessId
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateEventA
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
OpenFileMappingA
lstrcpynA
LoadLibraryA
EnterCriticalSection
GetProcessHeap
HeapSize
GetFileInformationByHandle
VirtualQuery
FileTimeToSystemTime
CreateDirectoryA
FreeLibrary
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetErrorMode
GetLastError
RaiseException
CloseHandle
WaitForSingleObject
GetFileAttributesA
OutputDebugStringW
FileTimeToLocalFileTime
SetEnvironmentVariableA
MultiByteToWideChar
MulDiv
CreateFileA
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
IsProcessorFeaturePresent
UnhandledExceptionFilter
LocalAlloc
LoadLibraryW
GetModuleHandleW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetLastError
OutputDebugStringA
Module32Next
Module32First
GetModuleHandleExA
GetFinalPathNameByHandleA
RtlCaptureStackBackTrace
VirtualFree
VirtualProtect
VirtualAlloc
TlsFree
GetCurrentThread
GetCurrentProcess
InitializeCriticalSection
RemoveVectoredExceptionHandler
AddVectoredExceptionHandler
SetUnhandledExceptionFilter
GetWindowsDirectoryA
TlsSetValue
TlsGetValue
TlsAlloc
GetTempPathA
CreateMutexA
ReleaseMutex
TerminateThread
GetSystemTime
GetTickCount
EnableWindow
LoadCursorA
SendMessageA
SendMessageTimeoutA
PostMessageA
GetFocus
SetCapture
ReleaseCapture
GetDC
ReleaseDC
InvalidateRect
SetPropA
GetPropA
GetClientRect
GetWindowRect
GetCursorPos
EnumThreadWindows
OffsetRect
ClientToScreen
GetSysColor
DrawFocusRect
FillRect
CopyRect
InflateRect
PtInRect
RegisterWindowMessageA
UnregisterClassA
SetForegroundWindow
GetWindowTextA
MessageBoxA
MessageBeep
SetCursor
EnumWindows
LoadIconW
IsWindow
ShowWindow
SetWindowPos
DestroyMenu
SetRectEmpty
IsRectEmpty
GetDesktopWindow
SetParent
SetTimer
KillTimer
UpdateWindow
DrawEdge
CallWindowProcA
SetLayeredWindowAttributes
IsWindowVisible
IsIconic
IsZoomed
SetFocus
GetActiveWindow
GetKeyState
GetKeyboardState
ToAscii
MapVirtualKeyA
GetSystemMetrics
GetMenuState
GetSystemMenu
CreatePopupMenu
CheckMenuItem
EnableMenuItem
GetSubMenu
GetMenuItemID
GetMenuItemCount
InsertMenuA
AppendMenuA
DeleteMenu
DrawIcon
DrawTextA
DrawTextW
GetForegroundWindow
GetWindowDC
LockWindowUpdate
RemovePropA
SetCursorPos
GetCursor
ScreenToClient
SetRect
UnionRect
GetWindowLongA
SetWindowLongA
GetParent
GetWindow
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
LoadBitmapW
DestroyIcon
DrawIconEx
SystemParametersInfoA
MonitorFromRect
GetMonitorInfoA
GetDlgCtrlID
IsWindowEnabled
SetWindowTextA
MessageBoxIndirectA
FindWindowA
AttachThreadInput
SetActiveWindow
GetWindowThreadProcessId
ShowScrollBar
GetMessagePos
GetDoubleClickTime
UpdateLayeredWindow
EndPaint
RedrawWindow
BeginPaint
SetBkColor
CreateFontIndirectA
SetDIBColorTable
GetDeviceCaps
GetTextExtentPoint32A
SetTextColor
GetTextMetricsA
SetLayout
DeleteDC
TextOutW
CreateSolidBrush
GetTextAlign
SelectObject
GetObjectA
CreateCompatibleBitmap
CreateCompatibleDC
CreatePen
GetViewportOrgEx
GetClipBox
GetStockObject
GetCurrentObject
CreateDIBSection
DeleteObject
SetViewportOrgEx
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegSetValueA
RegDeleteValueA
RegOpenKeyA
RegCreateKeyA
OpenProcessToken
OpenThreadToken
GetTokenInformation
LookupAccountSidA
RegCreateKeyExA
Shell_NotifyIconA
DragQueryFileA
ShellExecuteA
SHGetFolderPathA
SHGetKnownFolderPath
ImageList_Draw
ImageList_AddMasked
ImageList_ReplaceIcon
PathFindFileNameA
SHSetValueA
PathIsURLA
PathAppendA
PathRemoveExtensionA
GetRunningObjectTable
CreateFileMoniker
CreateStreamOnHGlobal
CoRegisterClassObject
OleDestroyMenuDescriptor
StgOpenStorage
OleRun
CoCreateInstance
CoTaskMemFree
RevokeActiveObject
SysAllocString
SysAllocStringLen
VariantInit
SysFreeString
VariantCopy
LoadRegTypeLi
SysStringLen
SysStringByteLen
VariantClear
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
SysAllocStringByteLen
EnumProcessModules
GetModuleFileNameExA
GetModuleInformation
??0CLanguageFallbackInformation@@QAE@$$QAV0@@Z
??0CLanguageFallbackInformation@@QAE@ABV0@@Z
??0CLanguageFallbackInformation@@QAE@XZ
??0CSplashWindow@@QAE@I@Z
??1CLanguageFallbackInformation@@QAE@XZ
??1CSplashWindow@@UAE@XZ
??4CLanguageFallbackInformation@@QAEAAV0@$$QAV0@@Z
??4CLanguageFallbackInformation@@QAEAAV0@ABV0@@Z
??_7CSplashWindow@@6B@
??_FCSplashWindow@@QAEXXZ
?Create@CSplashWindow@@QAEHXZ
?GetMessageMap@CSplashWindow@@MBEPBUAFX_MSGMAP@@XZ
?GetThisMessageMap@CSplashWindow@@KGPBUAFX_MSGMAP@@XZ
?GetTraceText@CLanguageFallbackInformation@@QBE?AV?$CStringT@DV?$StrTraitMFC_DLL@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@XZ
?OnPaint@CSplashWindow@@IAEXXZ
?OnTimer@CSplashWindow@@IAEXI@Z
?PreTranslateMessage@CSplashWindow@@UAEHPAUtagMSG@@@Z
?charset@CLanguageFallbackInformation@@QBEEXZ
?codePage@CLanguageFallbackInformation@@QBEIXZ
?language@CLanguageFallbackInformation@@QBE?AV?$CStringT@DV?$StrTraitMFC_DLL@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@XZ
?needsFallbackToEnglish@CLanguageFallbackInformation@@QBE_NXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ