Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
123cd25765c35f6223edd1f688543be1ec8dcaaed2b07a54a08c2f22ab49f3e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
123cd25765c35f6223edd1f688543be1ec8dcaaed2b07a54a08c2f22ab49f3e2.exe
Resource
win10v2004-20220812-en
Target
123cd25765c35f6223edd1f688543be1ec8dcaaed2b07a54a08c2f22ab49f3e2
Size
1.9MB
MD5
0a5b36e71a5d8118f6a496571dafc5b4
SHA1
97bdf89d37efd6ce71ba39bc341f06ce3f50b47e
SHA256
123cd25765c35f6223edd1f688543be1ec8dcaaed2b07a54a08c2f22ab49f3e2
SHA512
3dcb5084eab18660baf1c9d52ca36d4a495924c7a37a9ec1b22eac8b36a77a5323ed66ee8fb04470a5ac6b74037558a70381700d49fcbb60010808e7f904310d
SSDEEP
49152:bGS7/mBQspwDoYU3Ie0UbLaknLBZySBp/xi:acm2spwDoFYkPaknFZyew
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetModuleHandleA
InterlockedIncrement
lstrlenA
GetThreadLocale
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetFullPathNameW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileTime
GetStartupInfoW
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetDriveTypeA
FindFirstFileA
HeapReAlloc
ExitThread
ExitProcess
HeapSize
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GlobalReAlloc
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetFullPathNameA
GetCurrentDirectoryA
SetConsoleCtrlHandler
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
SetConsoleMode
ReadConsoleInputA
GetFileInformationByHandle
FlushConsoleInputBuffer
GlobalMemoryStatus
ExpandEnvironmentStringsW
WaitForMultipleObjects
PeekNamedPipe
GetSystemDirectoryA
SleepEx
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
FreeResource
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
lstrcmpW
GetVersionExA
GetVersion
GlobalGetAtomNameW
GlobalAddAtomW
SetLastError
FindResourceW
LoadResource
LockResource
SizeofResource
WriteFile
GetTempFileNameW
GetFileAttributesW
HeapFree
IsBadReadPtr
LoadLibraryA
VirtualFree
VirtualAlloc
GetProcessHeap
HeapAlloc
GetLongPathNameW
MoveFileW
CreateThread
AreFileApisANSI
GetSystemDirectoryW
GetVolumeInformationW
DeviceIoControl
MulDiv
Sleep
ReleaseMutex
CreateMutexW
OutputDebugStringW
DeleteFileA
CreateDirectoryA
InterlockedDecrement
GetModuleHandleW
VerSetConditionMask
VerifyVersionInfoW
GlobalLock
GlobalUnlock
SetFileAttributesW
GetSystemInfo
FormatMessageW
LocalFree
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
CopyFileW
MoveFileExW
GlobalAlloc
GlobalFree
GetCommandLineW
CreateRemoteThread
GetExitCodeThread
ReadProcessMemory
WaitForSingleObject
GetExitCodeProcess
GetWindowsDirectoryW
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
OpenProcess
GetLogicalDriveStringsW
lstrcmpiW
QueryDosDeviceW
lstrlenW
GetEnvironmentVariableW
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
QueryPerformanceCounter
GetPrivateProfileStringW
QueryPerformanceFrequency
SetUnhandledExceptionFilter
SetErrorMode
VirtualProtect
WriteProcessMemory
CreateDirectoryW
GetCurrentThreadId
GetCurrentProcessId
GetLocalTime
GetPrivateProfileIntW
CreateProcessW
CloseHandle
WritePrivateProfileStringW
CreateFileW
GetFileSize
ReadFile
GetLastError
GetModuleFileNameW
GetCurrentProcess
LoadLibraryW
GetProcAddress
FreeLibrary
GetTempPathW
SetHandleCount
DeleteFileW
UnregisterClassW
IsRectEmpty
LoadCursorW
GetSysColorBrush
GetMenuItemInfoW
InflateRect
EndPaint
BeginPaint
GetWindowDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
FillRect
RegisterClipboardFormatW
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
MoveWindow
SetWindowTextW
IsDialogMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageW
SendDlgItemMessageA
IsChild
SetWindowsHookExW
SetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
DispatchMessageW
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
PostThreadMessageW
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
GetClientRect
MessageBoxW
CreateWindowExW
PostMessageW
FindWindowW
SetForegroundWindow
ShowWindow
IsWindow
GetParent
GetClassInfoExW
RegisterClassW
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
GetWindowPlacement
RegisterWindowMessageW
GetSysColor
UnpackDDElParam
ReuseDDElParam
LoadMenuW
DestroyMenu
WinHelpW
SetWindowPos
SetFocus
GetActiveWindow
CharUpperW
CharNextW
CopyAcceleratorTableW
SetRect
InvalidateRgn
IsWindowEnabled
EqualRect
GetNextDlgGroupItem
CreateDialogIndirectParamW
EndDialog
CallNextHookEx
BringWindowToTop
AttachThreadInput
UnregisterClassA
MessageBoxA
GetProcessWindowStation
GetUserObjectInformationW
GetWindowThreadProcessId
ClientToScreen
GetForegroundWindow
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
IsClipboardFormatAvailable
GetSystemMetrics
GetDesktopWindow
GetWindowRect
GetClassNameW
keybd_event
GetWindowTextW
FindWindowExW
GetFocus
MessageBeep
UnhookWindowsHookEx
GetNextDlgTabItem
CharLowerW
SetWindowLongW
GetWindowLongW
GetMonitorInfoW
SystemParametersInfoW
EnumDisplayMonitors
PtInRect
MonitorFromPoint
ReleaseDC
GetDC
TranslateAcceleratorW
EnableWindow
GetDlgItem
GetKeyState
GetDlgCtrlID
GetMenu
LoadIconW
SetCursor
PeekMessageW
GetCapture
ReleaseCapture
LoadAcceleratorsW
SetActiveWindow
IsWindowVisible
InvalidateRect
UpdateWindow
IsIconic
SendMessageW
InsertMenuItemW
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
GetClassInfoW
IntersectRect
OffsetRect
SetRectEmpty
CopyRect
GetLastActivePopup
SetMenu
GetWindow
CreateSolidBrush
CreateFontIndirectW
GetTextExtentPoint32W
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetStockObject
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
RectVisible
PtVisible
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
Escape
ExtTextOutW
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
TextOutW
GetFileTitleW
OpenPrinterW
DocumentPropertiesW
ClosePrinter
SetNamedSecurityInfoW
ReportEventA
DeregisterEventSource
RegQueryValueW
RegDeleteKeyW
RegCreateKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
RegisterEventSourceA
RegEnumKeyW
RegOpenKeyW
RegCreateKeyExA
OpenProcessToken
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DuplicateTokenEx
CreateProcessAsUserW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
SHGetSpecialFolderPathW
ShellExecuteExW
DragFinish
DragQueryFileW
ShellExecuteW
ord17
PathRemoveFileSpecA
PathRemoveFileSpecW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathFileExistsW
PathFileExistsA
PathIsUNCW
OleUIBusyW
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
CoFreeUnusedLibraries
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoUninitialize
CLSIDFromString
OleUninitialize
SysAllocString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysStringLen
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
VariantCopy
GetErrorInfo
SysFreeString
URLDownloadToFileW
HttpQueryInfoW
InternetCloseHandle
InternetOpenUrlW
InternetReadFile
InternetSetOptionW
InternetOpenW
GdiplusShutdown
GdiplusStartup
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
GetModuleFileNameExW
EnumProcesses
GetAdaptersInfo
__WSAFDIsSet
select
ioctlsocket
gethostname
listen
getservbyport
gethostbyaddr
getservbyname
accept
recvfrom
shutdown
sendto
htonl
inet_ntoa
gethostbyname
inet_addr
WSASetLastError
WSACleanup
WSAStartup
WSAGetLastError
closesocket
socket
recv
send
getsockname
ntohs
bind
htons
getsockopt
getpeername
connect
setsockopt
curl_easy_cleanup
curl_easy_duphandle
curl_easy_escape
curl_easy_getinfo
curl_easy_init
curl_easy_pause
curl_easy_perform
curl_easy_recv
curl_easy_reset
curl_easy_send
curl_easy_setopt
curl_easy_strerror
curl_easy_unescape
curl_escape
curl_formadd
curl_formfree
curl_formget
curl_free
curl_getdate
curl_getenv
curl_global_cleanup
curl_global_init
curl_global_init_mem
curl_maprintf
curl_mfprintf
curl_mprintf
curl_msnprintf
curl_msprintf
curl_multi_add_handle
curl_multi_assign
curl_multi_cleanup
curl_multi_fdset
curl_multi_info_read
curl_multi_init
curl_multi_perform
curl_multi_remove_handle
curl_multi_setopt
curl_multi_socket
curl_multi_socket_action
curl_multi_socket_all
curl_multi_strerror
curl_multi_timeout
curl_mvaprintf
curl_mvfprintf
curl_mvprintf
curl_mvsnprintf
curl_mvsprintf
curl_share_cleanup
curl_share_init
curl_share_setopt
curl_share_strerror
curl_slist_append
curl_slist_free_all
curl_strequal
curl_strnequal
curl_unescape
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ