Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
0a10f46172b5e7bc56798b6c5a0ec6afa5ae6e2993b4a937a1783d78c93ac184.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a10f46172b5e7bc56798b6c5a0ec6afa5ae6e2993b4a937a1783d78c93ac184.exe
Resource
win10v2004-20220812-en
Target
0a10f46172b5e7bc56798b6c5a0ec6afa5ae6e2993b4a937a1783d78c93ac184
Size
414KB
MD5
f690d85675f46c4a407ee8f98d60ce2c
SHA1
fbcc12110ff54b19868a9bc7eb47e5c5a95b146a
SHA256
0a10f46172b5e7bc56798b6c5a0ec6afa5ae6e2993b4a937a1783d78c93ac184
SHA512
8df3fb01fbda900286209747037c9ed971cc31b454f8bae5ca62e1394325aea482f23305bac3b52fd3119f062c75873a434319e022980e876c5839ac27324b6a
SSDEEP
6144:EmZqTFoN69Xmg5qTyZ2sh++6CKLIZfiW4Y10vmGia1lc4lxfJHDsnzUOel:EmZqTGOxOCwPW4Y10uGP1/7ZezUll
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WaitForSingleObject
TerminateProcess
lstrcmpiA
lstrlenW
LocalAlloc
LocalFree
MultiByteToWideChar
IsDBCSLeadByte
LeaveCriticalSection
RaiseException
EnterCriticalSection
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedIncrement
CreateMutexA
GetCurrentThreadId
FlushInstructionCache
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
lstrcmpA
CreateEventA
CopyFileA
CreateFileW
WriteConsoleW
SetStdHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
CreateRemoteThread
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapReAlloc
HeapCreate
GetStdHandle
ExitProcess
HeapSize
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualProtect
GetFileAttributesA
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetExitCodeProcess
DuplicateHandle
Process32Next
GetCurrentProcessId
OpenProcess
Process32First
CreateToolhelp32Snapshot
CreateDirectoryA
FreeLibrary
WideCharToMultiByte
OutputDebugStringA
GetModuleFileNameW
GetPrivateProfileStringA
LoadLibraryW
LoadLibraryA
GetLastError
GetFileAttributesW
GetModuleHandleW
SetLastError
GetTempFileNameA
FindNextFileA
FindClose
FindFirstFileA
GetFileSize
DeviceIoControl
GetModuleFileNameA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
Sleep
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetVersion
GetVersionExA
CloseHandle
WriteFile
CreateFileA
DeleteFileA
lstrlenA
InterlockedDecrement
GetStringTypeW
CreateWindowExA
wsprintfA
PeekMessageA
TranslateMessage
DispatchMessageA
FindWindowA
GetSysColor
GetWindowLongA
GetParent
GetWindow
GetClientRect
SetWindowPos
GetSystemMetrics
GetDesktopWindow
GetClassNameA
GetFocus
LoadStringW
CharNextA
RegisterClassExA
LoadCursorA
DefWindowProcA
SetWindowLongA
UnregisterClassA
DestroyAcceleratorTable
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
BeginPaint
EndPaint
IsChild
SetFocus
GetDlgItem
SendMessageA
IsWindow
RedrawWindow
GetClassInfoExA
MessageBoxA
DestroyWindow
CreateAcceleratorTableA
ClientToScreen
ScreenToClient
MoveWindow
SetCapture
ReleaseCapture
FillRect
InvalidateRgn
CallWindowProcA
InvalidateRect
GetDC
ReleaseDC
DeleteObject
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetDeviceCaps
BitBlt
DeleteDC
GetStockObject
GetObjectA
AllocateAndInitializeSid
RegQueryInfoKeyW
RegSetValueExA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
QueryServiceConfig2A
QueryServiceConfigA
EnumServicesStatusExA
RegEnumValueA
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
ChangeServiceConfigA
ChangeServiceConfig2A
CreateServiceA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
FreeSid
CheckTokenMembership
SHGetSpecialFolderLocation
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderPathA
CoFreeUnusedLibraries
CoInitializeEx
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoCreateGuid
CoTaskMemRealloc
CoTaskMemAlloc
OleUninitialize
StringFromGUID2
OleLockRunning
CreateStreamOnHGlobal
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
OleInitialize
VariantInit
VariantClear
SysFreeString
SysStringLen
SysAllocStringLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VarUI4FromStr
VariantChangeType
SysAllocString
InternetCloseHandle
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetQueryDataAvailable
InternetReadFile
InternetOpenA
InternetOpenUrlA
DeleteUrlCacheEntry
URLDownloadToFileA
GetModuleFileNameExA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ