Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
436909a16f1202c328732c4dd6bc7b3ce8c49682f7c5151cd2851915b9154673.exe
Resource
win7-20220812-en
Target
436909a16f1202c328732c4dd6bc7b3ce8c49682f7c5151cd2851915b9154673
Size
448KB
MD5
dfb6048138b5aa9317e22515edb8908f
SHA1
2eeb014fc359874915afb93641068f0dd5c1748a
SHA256
436909a16f1202c328732c4dd6bc7b3ce8c49682f7c5151cd2851915b9154673
SHA512
3939d29f969e3332c4ee98341262ec79481dc43ca28c6140731aac8df931924d4de0bbceffdc253f38b80199ac00df143aaf0ad8fae167ca8f6502d84411bbd2
SSDEEP
6144:/KOtEtEtEtEtEtEtEtEtEtEt14xwmjSu0s:/1eeeeeeeeee14xwmx
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
LoadLibraryA
GetProcAddress
VirtualAlloc
GetLastError
GetThreadLocale
VirtualAllocEx
ReplaceFileW
GetCommMask
FindNextVolumeMountPointA
GetConsoleCP
SetComputerNameExW
GetComputerNameA
GetVolumeNameForVolumeMountPointW
GlobalCompact
SetCommConfig
SetThreadAffinityMask
WriteProfileSectionA
SetStdHandle
lstrcmpiA
GetCPInfo
GetTimeZoneInformation
CreateWaitableTimerA
GetPrivateProfileIntW
GetThreadPriorityBoost
SetPriorityClass
GetCurrentProcess
GetVersionExW
VirtualProtect
GetSystemInfo
VirtualQuery
MultiByteToWideChar
lstrlenW
lstrcpyW
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
HeapDestroy
SetEvent
CloseHandle
WaitForSingleObject
lstrcpynW
GetModuleFileNameW
FreeLibrary
LoadLibraryW
CreateThread
CreateEventW
lstrcatW
lstrlenA
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
Sleep
HeapSetInformation
GetCurrentThreadId
GetCommandLineW
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
RtlUnwind
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
SetUnhandledExceptionFilter
LoadIconA
IsGUIThread
IsCharAlphaA
IsCharLowerA
IsCharAlphaNumericW
IsCharAlphaNumericA
IsCharLowerW
IsCharAlphaW
IsCharUpperA
IsClipboardFormatAvailable
IsCharUpperW
IsWindowUnicode
GetMenu
DrawIcon
IsChild
GetNextDlgGroupItem
CheckMenuItem
DrawFrame
CreateDialogIndirectParamW
GetMenuInfo
GetInputDesktop
GetThreadDesktop
DdeNameService
UnloadKeyboardLayout
SetClassLongA
GetWindowRgn
GetParent
ReleaseCapture
LoadCursorFromFileA
DefDlgProcW
GetKeyNameTextA
DdeUnaccessData
GetScrollInfo
GetQueueStatus
ChildWindowFromPointEx
EditWndProc
SetWindowPos
IMPSetIMEA
DdeReconnect
IMPQueryIMEW
SetWindowRgn
DdeAddData
DispatchMessageW
CharPrevW
PostThreadMessageW
CharNextW
GetMessageW
GetEnhMetaFileA
RectInRegion
CLIPOBJ_cEnumStart
GetTextMetricsW
HT_Get8BPPMaskPalette
GetWindowExtEx
RoundRect
CreateDIBitmap
GdiCreateLocalMetaFilePict
EngDeleteClip
GetICMProfileW
GetCharacterPlacementW
FONTOBJ_pfdg
Rectangle
PolyBezier
DeviceCapabilitiesExA
GetMetaRgn
GdiGetCodePage
SetAbortProc
GdiReleaseLocalDC
RegQueryValueExW
GetUserNameW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
ShellExecuteExA
DragFinish
ExtractIconW
FindExecutableA
SHGetFolderPathW
DoEnvironmentSubstW
SHLoadInProc
SHFormatDrive
SHCreateProcessAsUserW
CoInitialize
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ