Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
38d7bb17df3d21059ec269838415457c7442d498678942594e7730c5d132134c.exe
Resource
win7-20220414-en
Target
38d7bb17df3d21059ec269838415457c7442d498678942594e7730c5d132134c
Size
448KB
MD5
26c71269eac9b2780e4cb5ca4fe15ae3
SHA1
368e06b6a2871cef2ae72f647ea1aef82f1de456
SHA256
38d7bb17df3d21059ec269838415457c7442d498678942594e7730c5d132134c
SHA512
85eb1fa72e4f8ffbb51f813d5d9807c0a2ea996808eac1c7dc036d837599899135b8b8c525972c47900b97caad5f8f2969cec1813acd8f57f7299744e05dc2de
SSDEEP
6144:/KOtEtEtEtEtEtEtEtEtEtEt14xwmjSu0E:/1eeeeeeeeee14xwmN
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
LoadLibraryA
GetProcAddress
VirtualAlloc
GetLastError
GetThreadLocale
VirtualAllocEx
ReplaceFileW
GetCommMask
FindNextVolumeMountPointA
GetConsoleCP
SetComputerNameExW
GetComputerNameA
GetVolumeNameForVolumeMountPointW
GlobalCompact
SetCommConfig
SetThreadAffinityMask
WriteProfileSectionA
SetStdHandle
lstrcmpiA
GetCPInfo
GetTimeZoneInformation
CreateWaitableTimerA
GetPrivateProfileIntW
GetThreadPriorityBoost
SetPriorityClass
GetCurrentProcess
GetVersionExW
VirtualProtect
GetSystemInfo
VirtualQuery
MultiByteToWideChar
lstrlenW
lstrcpyW
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
HeapDestroy
SetEvent
CloseHandle
WaitForSingleObject
lstrcpynW
GetModuleFileNameW
FreeLibrary
LoadLibraryW
CreateThread
CreateEventW
lstrcatW
lstrlenA
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
Sleep
HeapSetInformation
GetCurrentThreadId
GetCommandLineW
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
RtlUnwind
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
SetUnhandledExceptionFilter
LoadIconA
IsGUIThread
IsCharAlphaA
IsCharLowerA
IsCharAlphaNumericW
IsCharAlphaNumericA
IsCharLowerW
IsCharAlphaW
IsCharUpperA
IsClipboardFormatAvailable
IsCharUpperW
IsWindowUnicode
GetMenu
DrawIcon
IsChild
GetNextDlgGroupItem
CheckMenuItem
DrawFrame
CreateDialogIndirectParamW
GetMenuInfo
GetInputDesktop
GetThreadDesktop
DdeNameService
UnloadKeyboardLayout
SetClassLongA
GetWindowRgn
GetParent
ReleaseCapture
LoadCursorFromFileA
DefDlgProcW
GetKeyNameTextA
DdeUnaccessData
GetScrollInfo
GetQueueStatus
ChildWindowFromPointEx
EditWndProc
SetWindowPos
IMPSetIMEA
DdeReconnect
IMPQueryIMEW
SetWindowRgn
DdeAddData
DispatchMessageW
CharPrevW
PostThreadMessageW
CharNextW
GetMessageW
GetEnhMetaFileA
RectInRegion
CLIPOBJ_cEnumStart
GetTextMetricsW
HT_Get8BPPMaskPalette
GetWindowExtEx
RoundRect
CreateDIBitmap
GdiCreateLocalMetaFilePict
EngDeleteClip
GetICMProfileW
GetCharacterPlacementW
FONTOBJ_pfdg
Rectangle
PolyBezier
DeviceCapabilitiesExA
GetMetaRgn
GdiGetCodePage
SetAbortProc
GdiReleaseLocalDC
RegQueryValueExW
GetUserNameW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
ShellExecuteExA
DragFinish
ExtractIconW
FindExecutableA
SHGetFolderPathW
DoEnvironmentSubstW
SHLoadInProc
SHFormatDrive
SHCreateProcessAsUserW
CoInitialize
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ