Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
4d041cb67dd05b71c2da8c2b85ab6972e7fd097f3268295f4679480273bf1647.exe
Resource
win7-20220718-en
Target
4d041cb67dd05b71c2da8c2b85ab6972e7fd097f3268295f4679480273bf1647
Size
104KB
MD5
1934fa4786eaf1339b4f808154f3f9c3
SHA1
eccfb04816095ae59d196295b9713773717a65cc
SHA256
4d041cb67dd05b71c2da8c2b85ab6972e7fd097f3268295f4679480273bf1647
SHA512
47e99dfae7deb0a5310c8cdcb28c744b6a7c02f5d72167904b85506bb7c62ce8b7daa5ad68dfdf5e64ea58867a3358ed72f45035ecbc97a53d9bb0a289a6eafa
SSDEEP
3072:IeOu7+iAakCyv7kVJhtjqZehZjIiq9Yn50VlJ:xKimD7kVJhMZezNq9YnS
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetVersion
GetVersionExW
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LeaveCriticalSection
LoadLibraryExW
LocalAlloc
MultiByteToWideChar
OpenSemaphoreA
OutputDebugStringW
Process32First
RaiseException
ResetEvent
ResumeThread
RtlUnwind
SetEnvironmentVariableW
SetEvent
GetThreadLocale
SignalObjectAndWait
Sleep
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VerifyVersionInfoA
VirtualAlloc
VirtualFree
VirtualQuery
VirtualQueryEx
WaitForSingleObject
WideCharToMultiByte
WriteConsoleOutputAttribute
WriteFile
lstrcpynW
lstrlenW
LoadLibraryA
LoadLibraryW
GetModuleHandleA
VirtualAllocEx
GetSystemWindowsDirectoryA
GetSystemInfo
GetStdHandle
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLogicalDrives
GetLocaleInfoW
GetLocalTime
GetLastError
GetExitCodeThread
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetCommandLineW
GetCPInfo
GetACP
FreeLibraryAndExitThread
FreeLibrary
FormatMessageW
FindFirstFileW
FindClose
ExitThread
ExitProcess
EnumCalendarInfoA
EnterCriticalSection
DeleteCriticalSection
CreateThread
CreateFileW
CreateFileMappingW
CreateEventW
CopyFileExA
CompareStringW
CloseHandle
SetTapePosition
Beep
IsMenu
GetFocus
GetParent
GetOpenClipboardWindow
GetMenuCheckMarkDimensions
IsWindowEnabled
CountClipboardFormats
IsCharAlphaW
CreatePopupMenu
CopyIcon
VkKeyScanW
DestroyMenu
GetQueueStatus
IsWindowVisible
IsWindowUnicode
IsWindow
GetCaretBlinkTime
LoadIconW
ValidateRgn
ValidateRect
TranslateAcceleratorA
TileChildWindows
TabbedTextOutA
SetSystemCursor
SetMenuItemInfoW
SetDlgItemTextA
SetClassWord
SetClassLongW
SendMessageTimeoutW
RemovePropW
PtInRect
PeekMessageW
MsgWaitForMultipleObjects
MessageBoxW
MessageBoxA
LoadStringW
LoadMenuW
IsCharUpperW
InternalGetWindowText
GetNextDlgTabItem
GetKeyboardType
GetKeyboardLayoutNameW
GetDC
GetCursorPos
GetClassLongA
EnumPropsW
EnumPropsExA
EnumDesktopsW
EnumDesktopsA
EndMenu
EnableMenuItem
EmptyClipboard
DrawTextExW
DrawStateW
DrawIconEx
DefWindowProcW
DefFrameProcA
DefDlgProcA
DdeQueryStringA
DdeFreeStringHandle
DdeCmpStringHandles
CreateWindowStationA
CreateDialogIndirectParamA
CharUpperBuffW
CharToOemW
CharToOemBuffA
ChangeMenuW
CharLowerA
CharNextW
CharLowerBuffA
GetSystemMetrics
CreateMetaFileW
FillPath
EndPage
GetLayout
DeleteMetaFile
CreateHalftonePalette
GetDCBrushColor
GetPolyFillMode
GetTextCharacterExtra
PathToRegion
CreateSolidBrush
EndPath
StartFormPage
StartDocW
SetBoundsRect
STROBJ_bEnumPositionsOnly
PolylineTo
GetWinMetaFileBits
GetTextMetricsW
GetPaletteEntries
GdiGetPageCount
GdiEntry8
GdiAlphaBlend
FillRgn
EngQueryLocalTime
EngMultiByteToWideChar
EngFindResource
EngBitBlt
CreateFontIndirectExW
CreateEnhMetaFileA
CreateEllipticRgn
GetFileTitleA
RegQueryValueExW
RegCloseKey
RegEnumKeyA
RegOpenKeyExW
WOWShellExecute
ShellHookProc
ShellExecuteW
ShellExecuteExW
ShellExecuteA
ShellAboutW
SHQueryRecycleBinW
SHPathPrepareForWriteW
SHPathPrepareForWriteA
SHLoadInProc
SHGetPathFromIDListW
SHGetMalloc
SHGetFileInfo
SHGetDesktopFolder
SHGetDataFromIDListW
SHGetDataFromIDListA
SHFileOperation
SHCreateDirectoryExW
SHChangeNotify
ExtractIconExA
ExtractAssociatedIconExW
DuplicateIcon
DragQueryFileA
DragFinish
DoEnvironmentSubstA
CoTaskMemFree
StrCmpNA
StrRChrA
StrStrIA
StrChrIW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ