Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f.exe
Resource
win10v2004-20220414-en
Target
33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f
Size
1.8MB
MD5
75c84a17e6650f8ea78a8bbfaa873216
SHA1
9f18ebf3a8c23bf9f6ee4042d24123992f2e1fc2
SHA256
33721cf8886a5a20f86920d40fcc3bfeba2cfc52fc3d91ca0bf062fda716672f
SHA512
489a9b58b9812a90feedbac004631523657d7f4f86b2998fde84c752b4735d4990b55be36603cc3f517a58fab5eed1c51455673d8e6f96b92e7f592dc572eb01
SSDEEP
49152:TsnxTURFmPUxeIhlc4bKgATT2UA4YpCPS8Fvfa50v:dRIPI1bKgATy1TpwSwvow
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTempPathA
GetThreadLocale
GetThreadPriorityBoost
GetTickCount
GetTimeZoneInformation
GetVersion
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalFlags
GlobalFree
GlobalGetAtomNameA
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedDecrement
InterlockedIncrement
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalReAlloc
LockFile
LockResource
MoveFileA
MulDiv
MultiByteToWideChar
OutputDebugStringA
OutputDebugStringW
PrepareTape
QueryPerformanceCounter
GetTempFileNameA
RaiseException
ReadFile
RemoveDirectoryA
RtlCaptureContext
RtlUnwind
SearchPathA
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesA
SetFilePointer
SetFilePointerEx
SetFileTime
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SetVolumeLabelA
SizeofResource
Sleep
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
UnlockFile
VirtualFree
VirtualQuery
WaitForSingleObject
WaitNamedPipeA
WideCharToMultiByte
WinExec
WriteConsoleA
WriteConsoleW
WriteFile
WritePrivateProfileStringA
WritePrivateProfileStringW
lstrcatA
lstrcmpA
lstrcmpiA
lstrcmpiW
lstrcpyA
lstrcpynA
lstrlenA
lstrlenW
GetSystemTimeAsFileTime
GetSystemTime
GetSystemDirectoryA
GetStringTypeW
GetStringTypeA
GetStdHandle
GetStartupInfoW
GetStartupInfoA
GetShortPathNameA
GetProfileStringW
GetProfileStringA
GetProcessVersion
GetProcessHeap
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileStringA
GetPrivateProfileSectionA
GetPrivateProfileIntW
GetOEMCP
GetModuleHandleW
GetModuleHandleExW
GetModuleFileNameW
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameA
GetFileType
GetFileTime
GetFileSize
GetFileAttributesExW
GetFileAttributesA
GetExitCodeProcess
GetEnvironmentVariableW
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
GetDiskFreeSpaceA
GetDevicePowerState
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCurrencyFormatA
GetConsoleOutputCP
GetConsoleMode
GetConsoleCP
GetCommandLineW
GetCommandLineA
GetCPInfo
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageW
FormatMessageA
FlushFileBuffers
FindResourceW
FindResourceExW
FindResourceA
FindNextFileA
FindFirstFileExA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsA
ExitProcess
EnterCriticalSection
EncodePointer
DuplicateHandle
DeleteFileA
DeleteCriticalSection
DecodePointer
CreateThread
CreateProcessA
CreatePipe
CreateFileW
CreateFileA
CreateDirectoryA
CopyFileA
CompareStringW
CompareStringA
CompareFileTime
CloseHandle
AddConsoleAliasA
GetModuleHandleA
SetErrorMode
QueryPerformanceFrequency
VirtualAlloc
InsertMenuW
GetWindowWord
GetWindowRect
GetWindowLongA
GetUpdateRgn
GetSystemMenu
GetSysColor
GetDlgItemTextA
GetDlgItem
GetClientRect
GetClassInfoA
FindWindowExA
FillRect
ExitWindowsEx
EndPaint
EndDialog
EnableWindow
EnableMenuItem
EmptyClipboard
DrawTextA
DrawStateA
DispatchMessageA
DialogBoxParamA
DestroyWindow
DefWindowProcA
DdeFreeStringHandle
DdeCreateDataHandle
CreateWindowExA
CreateDialogParamW
CreateDialogParamA
CheckDlgButton
CharPrevA
CallWindowProcA
BeginPaint
AppendMenuA
InvalidateRect
IsMenu
GetMenuCheckMarkDimensions
GetDlgCtrlID
IsCharAlphaNumericW
GetAsyncKeyState
IsWindowEnabled
DrawMenuBar
GetOpenClipboardWindow
CopyIcon
GetActiveWindow
GetParent
CharNextA
GetMenuItemCount
GetTopWindow
GetDialogBaseUnits
InSendMessage
GetKBCodePage
ShowCaret
GetClipboardViewer
LoadIconA
GetClipboardData
GetDC
CreatePopupMenu
GetListBoxInfo
WindowFromDC
GetDesktopWindow
GetMessageTime
IsWindow
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadImageA
LoadStringW
MessageBoxIndirectA
OpenClipboard
PeekMessageA
PostQuitMessage
RegisterClassA
ScreenToClient
SendMessageA
SendMessageTimeoutA
SetClassLongA
SetClipboardData
SetCursor
SetDlgItemTextA
SetDlgItemTextW
SetForegroundWindow
SetTimer
SetWindowLongA
wsprintfA
WINNLSGetIMEHotkey
VkKeyScanA
TrackPopupMenu
SystemParametersInfoA
GetMessagePos
GetCursor
IsWindowUnicode
DestroyIcon
GetDoubleClickTime
GetForegroundWindow
CloseClipboard
LoadCursorFromFileW
CharLowerA
SwitchDesktop
ShowWindow
SetWindowTextW
SetWindowTextA
SetWindowPos
IsGUIThread
SetWindowPlacement
GetKeyboardLayout
GetShellWindow
DestroyCursor
GetSystemMetrics
FillPath
FlattenPath
GetTextAlign
AbortDoc
AddFontResourceW
EndPage
ColorMatchToTarget
CreateBrushIndirect
CreateFontIndirectA
CreateICA
CreatePen
CreatePolygonRgn
CreateSolidBrush
DeleteObject
DeviceCapabilitiesExW
DrawEscape
EngCreateDeviceBitmap
EngMultiByteToWideChar
EngPaint
EngPlgBlt
EngTransparentBlt
EnumFontFamiliesA
EnumMetaFile
EqualRgn
ExtCreateRegion
FONTOBJ_pvTrueTypeFontFile
FONTOBJ_pxoGetXform
GdiConvertBrush
GdiEntry16
EndPath
GdiFlush
GdiGetDC
GdiIsPlayMetafileDC
GdiPlayJournal
GdiValidateHandle
GetDCOrgEx
GetDeviceCaps
GetDeviceGammaRamp
GetGlyphOutline
GetMapMode
GetRandomRgn
GetWinMetaFileBits
GetWindowOrgEx
InvertRgn
PATHOBJ_bEnum
RectInRegion
RectVisible
RemoveFontResourceExW
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetICMMode
SetPixel
SetTextColor
TextOutA
UnloadNetworkFonts
UpdateICMRegKeyA
WidenPath
DeleteColorSpace
RealizePalette
CreateHalftonePalette
GetColorSpace
GetFontLanguageInfo
GetROP2
GetPolyFillMode
GetBkColor
StrokePath
DeleteDC
GetObjectType
UnrealizeObject
GdiEntry4
CreatePatternBrush
GetTextColor
RegEnumKeyA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegEnumValueA
RegOpenKeyW
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
SHGetDataFromIDListW
ShellHookProc
ShellExecuteExW
ShellExecuteEx
ShellExecuteA
ShellAboutW
DuplicateIcon
ExtractAssociatedIconExA
ExtractIconA
ExtractIconEx
FindExecutableA
SHBrowseForFolderA
SHBrowseForFolderW
SHCreateDirectoryExA
SHFileOperation
SHFileOperationA
WOWShellExecute
SHGetDiskFreeSpaceExW
SHGetFileInfoA
SHGetIconOverlayIndexW
SHGetPathFromIDListA
SHGetSettings
SHGetSpecialFolderLocation
SHLoadInProc
SHLoadNonloadedIconOverlayIdentifiers
SHQueryRecycleBinA
ShellAboutA
OleUninitialize
OleInitialize
CoUninitialize
CoTaskMemFree
CoSetProxyBlanket
CoInitializeSecurity
CoInitialize
CoCreateInstance
StrCmpNIW
StrCmpNW
StrRChrA
StrRStrIW
StrCmpNA
StrStrIA
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ