Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
6133A9A61AC4BA831B1417AFDD748D0D9BE6C4C5C28216AD97EBBD19BE0037B7.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
6133A9A61AC4BA831B1417AFDD748D0D9BE6C4C5C28216AD97EBBD19BE0037B7.exe
Resource
win10v2004-20220310-en
Target
6133A9A61AC4BA831B1417AFDD748D0D9BE6C4C5C28216AD97EBBD19BE0037B7.exe
Size
5.3MB
MD5
8938d3e8a1b8ef551687ba8c49aef13b
SHA1
1833fa9d05288d76111a828795b2cd5663c2af84
SHA256
6133a9a61ac4ba831b1417afdd748d0d9be6c4c5c28216ad97ebbd19be0037b7
SHA512
1b906e94f85297d0d7775335239d5c50b393a376b19eee0972255db23f05abcce99e40b19ed0faa03681f0bfe22a28417d2de88e0e82e3e9ec0e96ffb516b769
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
CN=Webroot,OU=Webroot,O=Webroot,L=Broomfield,ST=Colorado,C=US
CN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
LocalFileTimeToFileTime
GetCurrentThreadId
GetLocalTime
GetDiskFreeSpaceExW
GetSystemTimeAsFileTime
MoveFileW
RemoveDirectoryW
GetDriveTypeW
CreateDirectoryW
TerminateProcess
GetCommandLineA
GetCurrentProcess
OpenEventW
CreateEventW
ReleaseMutex
CreateFileW
GetFileAttributesW
WriteFile
SetUnhandledExceptionFilter
GetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
GetModuleHandleW
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryW
OpenProcess
GetLocaleInfoW
GetExitCodeProcess
DeleteFileW
GetPrivateProfileStringW
GetUserDefaultUILanguage
CopyFileW
ProcessIdToSessionId
GetTimeFormatW
GetDateFormatW
SystemTimeToFileTime
FileTimeToLocalFileTime
DecodePointer
HeapSize
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
TerminateThread
WaitForMultipleObjects
ExpandEnvironmentStringsW
GlobalFree
GetComputerNameW
SetErrorMode
GetVolumeInformationW
FileTimeToSystemTime
CheckRemoteDebuggerPresent
GetCurrentProcessId
SetEvent
DuplicateHandle
GetCommandLineW
GetProcAddress
FreeLibrary
ExitProcess
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
AllocConsole
GetStdHandle
GetTickCount
GlobalAlloc
WaitForSingleObject
CloseHandle
Sleep
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThread
GlobalLock
GlobalUnlock
DeviceIoControl
LocalAlloc
LocalFree
GetSystemTime
VerSetConditionMask
VerifyVersionInfoW
GetFileSizeEx
SetHandleInformation
UnmapViewOfFile
SetFileAttributesW
CreateFileMappingA
MapViewOfFile
MulDiv
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcessTimes
GetModuleHandleA
GetSystemDirectoryA
LoadLibraryA
WTSGetActiveConsoleSessionId
SetFilePointer
SetEndOfFile
MoveFileExW
CreateSemaphoreW
GetSystemInfo
CreateFileMappingW
AssignProcessToJobObject
ResumeThread
GetFileSize
SetThreadPriority
FindResourceA
CreateThread
QueryDosDeviceW
LoadLibraryExW
CreateEventA
OutputDebugStringA
WaitForSingleObjectEx
CompareFileTime
TryEnterCriticalSection
GetSystemPowerStatus
VirtualProtectEx
ReleaseSemaphore
CreateSemaphoreA
GetFileAttributesA
CreateFileA
DeleteFileA
CreateDirectoryA
GetShortPathNameW
ReadProcessMemory
VirtualQueryEx
GetProcessIoCounters
Thread32Next
Thread32First
CreateToolhelp32Snapshot
OpenThread
ReadFile
AreFileApisANSI
FindFirstFileW
CompareStringW
SetLastError
GetFullPathNameW
FindNextFileW
GetLongPathNameW
GetCPInfo
GetProcessAffinityMask
SetFileTime
GetModuleFileNameW
FoldStringW
CreateHardLinkW
FindClose
GetVersionExW
GetSystemDirectoryW
GetConsoleMode
TzSpecificLocalTimeToSystemTime
ResetEvent
IsDBCSLeadByte
SetThreadExecutionState
SystemTimeToTzSpecificLocalTime
GetFileType
FlushFileBuffers
GetOEMCP
PeekNamedPipe
GetACP
IsValidCodePage
GetFileInformationByHandle
VerLanguageNameW
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetStdHandle
ReadConsoleW
GetConsoleOutputCP
SetFilePointerEx
GetModuleHandleExW
QueryPerformanceFrequency
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetStringTypeW
CreateProcessW
GetFileAttributesExW
FindFirstFileExW
GetEnvironmentStringsW
PostQuitMessage
FillRect
DrawTextW
CreateWindowExW
CallWindowProcW
DrawIcon
DrawFrameControl
FindWindowA
SetRect
SetCursor
LoadCursorW
SetLayeredWindowAttributes
MoveWindow
AttachThreadInput
ClientToScreen
DrawTextA
OffsetRect
GetClassNameA
SetWindowTextW
InflateRect
GetMonitorInfoW
GetShellWindow
MonitorFromRect
EqualRect
FindWindowExW
SystemParametersInfoW
FindWindowExA
UnhookWindowsHookEx
WaitForInputIdle
CallNextHookEx
MapWindowPoints
GetFocus
GetMessagePos
SendInput
GetGUIThreadInfo
SetWindowsHookExW
MapVirtualKeyExW
CreateDesktopW
CharToOemBuffW
OemToCharA
CharToOemA
OemToCharBuffA
CharLowerW
CharUpperW
GetMessageExtraInfo
DispatchMessageW
TranslateMessage
BeginPaint
PostThreadMessageW
LockWorkStation
SetWindowLongW
GetWindowLongW
wsprintfW
EnumWindows
GetDC
IsWindowVisible
EnumDisplayDevicesW
GetGuiResources
ReleaseDC
GetWindowDC
PtInRect
MessageBoxW
EndPaint
GetAncestor
GetForegroundWindow
keybd_event
GetAsyncKeyState
GetKeyboardLayout
GetWindowTextW
SwitchToThisWindow
IsWindow
DestroyIcon
LoadImageA
LoadImageW
SetTimer
GetClientRect
SetWindowRgn
SetWindowPos
GetWindowRect
SetForegroundWindow
DestroyWindow
DefWindowProcW
CheckMenuItem
EnableWindow
IsIconic
InvalidateRect
PostMessageW
GetWindowThreadProcessId
FindWindowW
GetDesktopWindow
EnableMenuItem
GetSystemMetrics
UpdateWindow
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
KillTimer
ShowWindow
SetFocus
SendMessageW
SetWindowTextA
ScreenToClient
GetCursorPos
SetMessageExtraInfo
SetWinEventHook
UnhookWinEvent
GetWindowTextA
GetMessageW
MessageBeep
SetBrushOrgEx
GetDeviceCaps
CreateDIBSection
DeleteDC
BitBlt
SetTextColor
SelectObject
CreateCompatibleDC
DeleteObject
CreateRoundRectRgn
SetBkMode
GetStockObject
CreateCompatibleBitmap
GetPixel
CreateSolidBrush
CreatePen
SetWorldTransform
SetDCPenColor
RoundRect
SetStretchBltMode
SetDCBrushColor
Rectangle
StretchBlt
SetGraphicsMode
PatBlt
SetPixel
IntersectClipRect
ExtTextOutW
SetBkColor
ExcludeClipRect
SelectClipRgn
MoveToEx
LineTo
CreateFontA
GetObjectW
CombineRgn
CreateRectRgn
GetAce
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
CloseServiceHandle
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
UnregisterTraceGuids
RegisterTraceGuidsW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
GetUserNameW
TraceMessage
DuplicateTokenEx
GetLengthSid
SetThreadToken
OpenProcessToken
ConvertStringSidToSidW
SetTokenInformation
GetTokenInformation
SetSecurityInfo
InitializeAcl
CheckTokenMembership
FreeSid
CreateWellKnownSid
AllocateAndInitializeSid
RegOpenKeyExW
OpenSCManagerA
RegNotifyChangeKeyValue
CreateProcessAsUserW
SetEntriesInAclW
GetFileSecurityW
SetNamedSecurityInfoW
BuildExplicitAccessWithNameW
GetAclInformation
GetSecurityDescriptorDacl
ConvertSidToStringSidW
IsValidSid
SetFileSecurityW
AdjustTokenPrivileges
LookupPrivilegeValueW
CreateStreamOnHGlobal
GdipDisposeImage
GdipDrawImageRect
GdipGetImageHeight
GdiplusShutdown
GdiplusStartup
GdipDeleteGraphics
GdipGetImageWidth
GdipLoadImageFromStream
GdipCreateFromHDC
socket
getaddrinfo
WSAAddressToStringA
freeaddrinfo
closesocket
gethostbyname
inet_addr
connect
htons
send
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ