Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
137ebd2e486e324091bb0bb8ea7698f9245e05e60c0a393e7ac5795a988515d5N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
137ebd2e486e324091bb0bb8ea7698f9245e05e60c0a393e7ac5795a988515d5N.exe
Resource
win10v2004-20241007-en
Target
137ebd2e486e324091bb0bb8ea7698f9245e05e60c0a393e7ac5795a988515d5N.exe
Size
235KB
MD5
c5be7d0dec9103bb2c4173ef6bfe1d60
SHA1
3bb847c3484441c276f7fc16ead4e7214a3bfe96
SHA256
137ebd2e486e324091bb0bb8ea7698f9245e05e60c0a393e7ac5795a988515d5
SHA512
5d13cc52f1701152b69b65a9b7067f23c628691ff57f1cc0f5443087617562d8acbc040fe8f45958e7d6e17a62531096f4e3c8c81c1b013b774d65b5bba95406
SSDEEP
6144:MKP3AAe679MuCGA04izCqmseHPWditiXIKfftNo:MK4ZIMuf4iCBvn84K96
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IsBadCodePtr
GetProcessHeaps
IsBadWritePtr
lstrlenW
GetEnvironmentStringsW
DisconnectNamedPipe
FatalAppExitW
FatalAppExitA
GetLogicalDriveStringsW
InitializeCriticalSection
GetDiskFreeSpaceW
TlsAlloc
LoadLibraryA
GetSystemDirectoryA
BeginUpdateResourceW
SetUnhandledExceptionFilter
GetModuleHandleW
CopyFileExA
GetVolumeInformationW
GetLongPathNameA
SetCalendarInfoA
FindResourceW
ReplaceFileA
GetDateFormatW
GetEnvironmentVariableA
GetNumberFormatW
GetTempFileNameW
FindAtomW
GetVolumeInformationA
GetLogicalDrives
LocalFree
GetProcessHeap
GetACP
GetCurrentDirectoryA
MulDiv
GetUserDefaultLangID
GetLastError
GetLongPathNameW
EnumTimeFormatsA
EnumCalendarInfoW
CreateNamedPipeW
HeapCreate
GetLocaleInfoA
GetSystemDefaultLangID
FileTimeToSystemTime
LoadLibraryW
GetShortPathNameW
GetUserDefaultLCID
GetWindowsDirectoryA
GetThreadPriority
GetThreadLocale
GetTickCount
RemoveDirectoryW
GetTempFileNameA
GlobalAlloc
lstrcpynA
lstrcmpiW
GetTimeFormatA
lstrcmp
ReadDirectoryChangesW
OpenMutexW
GetFileAttributesW
GetShortPathNameA
CompareFileTime
EnumCalendarInfoA
EnumDateFormatsW
GetComputerNameA
GlobalGetAtomNameW
lstrcpyW
GetCurrentProcess
IsBadStringPtrA
OpenFile
GetLogicalDriveStringsA
GetVersionExA
MoveFileW
SystemTimeToFileTime
GetCalendarInfoA
GetProcAddress
GetOEMCP
SleepEx
SetErrorMode
FreeLibrary
SetCurrentDirectoryW
lstrcpyA
GetCalendarInfoW
lstrcpyn
SetEvent
RaiseException
GetWindowsDirectoryW
ReplaceFileW
SetCalendarInfoW
BeginUpdateResourceA
DuplicateHandle
lstrcmpiA
lstrcat
SetWindowPos
IsWindow
InsertMenuItemA
WinHelpW
EndDialog
CreateDialogIndirectParamA
SendDlgItemMessageW
wvsprintfW
GetCaretPos
MessageBeep
ShowWindow
ActivateKeyboardLayout
OpenClipboard
GetClassInfoExW
GetMessageW
EndMenu
ShowCursor
GetTopWindow
LoadImageA
SetDlgItemInt
ShowCaret
DialogBoxParamA
CharLowerW
DestroyIcon
PostMessageW
FindWindowA
mouse_event
DialogBoxParamW
SetForegroundWindow
CreateDialogIndirectParamW
CharNextA
GetMenuItemInfoW
DuplicateIcon
ShellExecuteExA
StrStrIW
SHBrowseForFolder
SHGetDiskFreeSpaceExA
SHGetFolderPathA
StrChrW
StrRChrIW
StrStrW
FreeIconList
SHGetDiskFreeSpaceA
ExtractAssociatedIconA
SHCreateDirectoryExW
CoDosDateTimeToFileTime
BindMoniker
CoGetClassObject
CreateFileMoniker
CoGetCurrentProcess
CoUninitialize
VarUI1FromDisp
SafeArrayCopy
VarBstrFromUI1
VarSub
VarImp
SafeArrayGetElement
RegisterActiveObject
glRasterPos2iv
glRenderMode
glTexCoord1sv
glGetPointerv
GlmfInitPlayback
glPixelMapuiv
glColor3bv
WSAGetLastError
WSASend
setsockopt
gethostbyname
CoInternetGetProtocolFlags
GetClassFileOrMime
CopyStgMedium
URLOpenStreamA
CoInternetParseUrl
CoInternetCompareUrl
CompareSecurityIds
URLDownloadToFileA
WriteHitLogging
HlinkSimpleNavigateToMoniker
GetComponentIDFromCLSSPEC
FindMediaTypeClass
CoInternetGetSession
SetSoftwareUpdateAdvertisementState
RegisterBindStatusCallback
TraceSQLError
TraceSQLGetData
WSAAsyncGetHostByAddr
GetTypeByNameA
WEP
rcmd
inet_network
WSASetBlockingHook
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ