Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
1b5059b735c0d710b728c80c2e7fb94283f7415b07e87d1c70ea6bad69e24a99.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1b5059b735c0d710b728c80c2e7fb94283f7415b07e87d1c70ea6bad69e24a99.exe
Resource
win10v2004-20241007-en
Target
1b5059b735c0d710b728c80c2e7fb94283f7415b07e87d1c70ea6bad69e24a99.exe
Size
235KB
MD5
d7a2573dde21482a28afb38718f2313f
SHA1
b17a59997aa1a3c88234694a7cfa15c77ebf4237
SHA256
1b5059b735c0d710b728c80c2e7fb94283f7415b07e87d1c70ea6bad69e24a99
SHA512
c218d55e86491a6a9cf6d777d2d21b7773f0c0a0217cd31f85f1dee4709cc5ac8970cf99e3b92dd11c081709c29fe432e7bd24b5c400913580840499098b0de4
SSDEEP
6144:MKP3AAe679MuCGA04izCqmseHPWditiXIKfftNoj:MK4ZIMuf4iCBvn84K96j
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IsBadCodePtr
GetProcessHeaps
IsBadWritePtr
lstrlenW
GetEnvironmentStringsW
DisconnectNamedPipe
FatalAppExitW
FatalAppExitA
GetLogicalDriveStringsW
InitializeCriticalSection
GetDiskFreeSpaceW
TlsAlloc
LoadLibraryA
GetSystemDirectoryA
BeginUpdateResourceW
SetUnhandledExceptionFilter
GetModuleHandleW
CopyFileExA
GetVolumeInformationW
GetLongPathNameA
SetCalendarInfoA
FindResourceW
ReplaceFileA
GetDateFormatW
GetEnvironmentVariableA
GetNumberFormatW
GetTempFileNameW
FindAtomW
GetVolumeInformationA
GetLogicalDrives
LocalFree
GetProcessHeap
GetACP
GetCurrentDirectoryA
MulDiv
GetUserDefaultLangID
GetLastError
GetLongPathNameW
EnumTimeFormatsA
EnumCalendarInfoW
CreateNamedPipeW
HeapCreate
GetLocaleInfoA
GetSystemDefaultLangID
FileTimeToSystemTime
LoadLibraryW
GetShortPathNameW
GetUserDefaultLCID
GetWindowsDirectoryA
GetThreadPriority
GetThreadLocale
GetTickCount
RemoveDirectoryW
GetTempFileNameA
GlobalAlloc
lstrcpynA
lstrcmpiW
GetTimeFormatA
lstrcmp
ReadDirectoryChangesW
OpenMutexW
GetFileAttributesW
GetShortPathNameA
CompareFileTime
EnumCalendarInfoA
EnumDateFormatsW
GetComputerNameA
GlobalGetAtomNameW
lstrcpyW
GetCurrentProcess
IsBadStringPtrA
OpenFile
GetLogicalDriveStringsA
GetVersionExA
MoveFileW
SystemTimeToFileTime
GetCalendarInfoA
GetProcAddress
GetOEMCP
SleepEx
SetErrorMode
FreeLibrary
SetCurrentDirectoryW
lstrcpyA
GetCalendarInfoW
lstrcpyn
SetEvent
RaiseException
GetWindowsDirectoryW
ReplaceFileW
SetCalendarInfoW
BeginUpdateResourceA
DuplicateHandle
lstrcmpiA
lstrcat
SetWindowPos
IsWindow
InsertMenuItemA
WinHelpW
EndDialog
CreateDialogIndirectParamA
SendDlgItemMessageW
wvsprintfW
GetCaretPos
MessageBeep
ShowWindow
ActivateKeyboardLayout
OpenClipboard
GetClassInfoExW
GetMessageW
EndMenu
ShowCursor
GetTopWindow
LoadImageA
SetDlgItemInt
ShowCaret
DialogBoxParamA
CharLowerW
DestroyIcon
PostMessageW
FindWindowA
mouse_event
DialogBoxParamW
SetForegroundWindow
CreateDialogIndirectParamW
CharNextA
GetMenuItemInfoW
DuplicateIcon
ShellExecuteExA
StrStrIW
SHBrowseForFolder
SHGetDiskFreeSpaceExA
SHGetFolderPathA
StrChrW
StrRChrIW
StrStrW
FreeIconList
SHGetDiskFreeSpaceA
ExtractAssociatedIconA
SHCreateDirectoryExW
CoDosDateTimeToFileTime
BindMoniker
CoGetClassObject
CreateFileMoniker
CoGetCurrentProcess
CoUninitialize
VarUI1FromDisp
SafeArrayCopy
VarBstrFromUI1
VarSub
VarImp
SafeArrayGetElement
RegisterActiveObject
glRasterPos2iv
glRenderMode
glTexCoord1sv
glGetPointerv
GlmfInitPlayback
glPixelMapuiv
glColor3bv
WSAGetLastError
WSASend
setsockopt
gethostbyname
CoInternetGetProtocolFlags
GetClassFileOrMime
CopyStgMedium
URLOpenStreamA
CoInternetParseUrl
CoInternetCompareUrl
CompareSecurityIds
URLDownloadToFileA
WriteHitLogging
HlinkSimpleNavigateToMoniker
GetComponentIDFromCLSSPEC
FindMediaTypeClass
CoInternetGetSession
SetSoftwareUpdateAdvertisementState
RegisterBindStatusCallback
TraceSQLError
TraceSQLGetData
WSAAsyncGetHostByAddr
GetTypeByNameA
WEP
rcmd
inet_network
WSASetBlockingHook
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ