Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
42cad1eec64d4d792828295ccd29e5380521d1b45f34aaf2b4d7d6e71027e209.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
42cad1eec64d4d792828295ccd29e5380521d1b45f34aaf2b4d7d6e71027e209.exe
Resource
win10v2004-20220901-en
Target
42cad1eec64d4d792828295ccd29e5380521d1b45f34aaf2b4d7d6e71027e209
Size
734KB
MD5
be7ffc5228acd4c28aa80eab51ab451f
SHA1
651c619ac4f145c837643387060d911c8967e84a
SHA256
42cad1eec64d4d792828295ccd29e5380521d1b45f34aaf2b4d7d6e71027e209
SHA512
51627d2df804beb73a5be182e2112ccb1d4ea67693bc893f6b4a2244554571116186f6b94e1435c08ede11d618477938986f16b219ef83baea718aad324e6597
SSDEEP
12288:t6Td07UdLpPXzEfSWvH+OwnWxm0JTqo6teEUxFmN4JXSzMsg:t6x0gbXkSsH+OugZT6BUM4hCg
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SetInformationJobObject
GetComputerNameW
GlobalUnWire
GetCommProperties
CreateDirectoryW
GetNumberOfConsoleMouseButtons
CopyFileExW
SignalObjectAndWait
WriteProfileStringA
GetCurrentThreadId
LocalFileTimeToFileTime
DeleteTimerQueueEx
GetDriveTypeW
ConnectNamedPipe
SetThreadUILanguage
ProcessIdToSessionId
LZStart
BuildCommDCBA
SetEnvironmentVariableA
SetFileTime
VerifyVersionInfoA
FatalAppExitW
lstrcmpi
GlobalFindAtomA
FindFirstVolumeA
SetComputerNameW
CommConfigDialogA
VerLanguageNameW
EnumSystemCodePagesW
FindResourceExA
WaitForMultipleObjects
GlobalUnlock
EnumDateFormatsW
SetErrorMode
GetStringTypeExA
QueryInformationJobObject
GetThreadPriority
MoveFileExA
HeapDestroy
CloseHandle
GetModuleHandleW
WaitForDebugEvent
GetConsoleAliasesA
CreateSemaphoreA
DeleteVolumeMountPointW
GetVersion
GetDiskFreeSpaceW
SetThreadContext
lstrcmp
ReadConsoleInputExA
SystemTimeToFileTime
GetLocalTime
GetSystemDefaultLCID
FindFirstFileW
GetPrivateProfileSectionA
VirtualQueryEx
CreateActCtxW
CreateDirectoryExW
EnumResourceLanguagesW
BeginUpdateResourceW
GetPrivateProfileStructA
GetConsoleInputWaitHandle
GetDateFormatW
GetHandleContext
OpenSemaphoreA
lstrcmpA
FindAtomW
OpenEventA
CompareFileTime
GetDriveTypeA
ExitProcess
LZClose
VirtualFree
GetComputerNameExA
SetLastConsoleEventActive
GetSystemDefaultUILanguage
CreateActCtxA
GetConsoleAliasesW
LocalReAlloc
SetUserGeoID
GetModuleHandleA
GetCommModemStatus
WaitCommEvent
FillConsoleOutputCharacterW
CreateMailslotW
OpenFileMappingW
FatalExit
GetCompressedFileSizeA
DebugBreak
FindNextChangeNotification
FindNextVolumeMountPointW
CreatePipe
SetProcessAffinityMask
InterlockedIncrement
FileTimeToLocalFileTime
FlushViewOfFile
GetFullPathNameW
RegisterWaitForInputIdle
WriteConsoleInputA
TransactNamedPipe
ExpandEnvironmentStringsA
SetLastError
ReadFile
GetPrivateProfileIntA
FindResourceExW
DisableThreadLibraryCalls
SetThreadLocale
LocalSize
PrepareTape
GetTapeParameters
GlobalWire
EnumDateFormatsExW
GetFileAttributesW
GetCommandLineA
GetProfileSectionW
EnumCalendarInfoExW
GetNumberOfConsoleFonts
SetSystemTime
GetACP
CreateSemaphoreW
SetWaitableTimer
LoadResource
FlushConsoleInputBuffer
GetComPlusPackageInstallStatus
MultiByteToWideChar
UpdateResourceW
LZCloseFile
GetUserDefaultLangID
GetPrivateProfileStringA
WriteProfileSectionA
EnterCriticalSection
DefineDosDeviceW
OpenFile
GetLongPathNameW
ConvertDefaultLocale
RemoveDirectoryW
Heap32Next
WriteTapemark
RtlZeroMemory
CallNamedPipeA
GetDiskFreeSpaceExW
ConsoleMenuControl
GetTimeFormatW
MoveFileWithProgressW
lstrcpyW
FindFirstFileExW
QueryPerformanceCounter
GetVolumeNameForVolumeMountPointW
GetConsoleMode
AddAtomA
CreateProcessW
CreateThread
HeapWalk
FileTimeToDosDateTime
GetOEMCP
SizeofResource
SetEnvironmentVariableW
MoveFileExW
lstrcpy
GetSystemInfo
GetProfileStringA
lstrlenW
GetThreadPriorityBoost
GetSystemTimeAdjustment
SleepEx
CreateFileW
FreeEnvironmentStringsA
VerLanguageNameA
IsBadWritePtr
SetLocalTime
MoveFileW
GetConsoleCP
RemoveVectoredExceptionHandler
FreeResource
BackupWrite
SetUnhandledExceptionFilter
CreateDirectoryExA
GetFileSize
CreateJobObjectA
ChangeTimerQueueTimer
GetConsoleTitleW
OpenMutexA
DeleteVolumeMountPointA
LocalAlloc
LocalCompact
RegisterWowExec
Sleep
lstrcatW
GetStringTypeA
DosDateTimeToFileTime
GlobalFree
GetConsoleTitleA
GetBinaryTypeA
LeaveCriticalSection
AttachConsole
GetProfileStringW
GetCalendarInfoW
GetSystemDirectoryA
HeapUnlock
GetVolumeInformationW
FatalAppExitA
BeginUpdateResourceA
DosPathToSessionPathW
FindFirstVolumeW
GetVersionExW
WaitNamedPipeA
GetProcessTimes
SetEndOfFile
GlobalGetAtomNameW
BuildCommDCBAndTimeoutsW
FreeConsole
GlobalFlags
FindNextFileA
GetConsoleKeyboardLayoutNameW
ScrollConsoleScreenBufferW
GlobalDeleteAtom
OpenJobObjectA
CreateWaitableTimerA
DelayLoadFailureHook
GlobalCompact
ReleaseMutex
ReadFileEx
SetCommConfig
SetDefaultCommConfigA
RtlCaptureStackBackTrace
SetFileShortNameW
GetDefaultCommConfigW
GetNamedPipeHandleStateW
RequestDeviceWakeup
ReadConsoleOutputAttribute
GetGeoInfoW
FindActCtxSectionStringW
TerminateJobObject
GetStartupInfoW
GetConsoleInputExeNameW
GetPrivateProfileSectionNamesA
EnumTimeFormatsW
CreateJobObjectW
UnlockFileEx
EnumCalendarInfoW
CreateFileMappingA
SetProcessPriorityBoost
GlobalSize
HeapReAlloc
HeapLock
GetDiskFreeSpaceExA
OutputDebugStringA
WriteConsoleInputW
WriteConsoleOutputCharacterA
IsValidLanguageGroup
IsBadHugeReadPtr
GetFileSizeEx
GetGeoInfoA
UnmapViewOfFile
MapViewOfFile
WaitForMultipleObjectsEx
QueueUserWorkItem
PrivMoveFileIdentityW
GetProfileIntA
UnregisterWait
SetThreadExecutionState
CreateWaitableTimerW
GetProcessVersion
ExitThread
TlsFree
LZSeek
RestoreLastError
GetProcessAffinityMask
GetTapeStatus
InitializeCriticalSection
GetLongPathNameA
GetExpandedNameA
GetThreadTimes
SetMailslotInfo
FreeLibraryAndExitThread
GetCurrentThread
GlobalReAlloc
RtlUnwind
SetStdHandle
WriteProfileStringW
GetThreadSelectorEntry
EnumSystemCodePagesA
FormatMessageA
RtlFillMemory
SetFilePointer
FindActCtxSectionGuid
QueryDosDeviceA
WriteFileEx
GetPrivateProfileIntW
GetProcessHeap
FoldStringA
GetConsoleCharType
WriteConsoleOutputA
PeekConsoleInputA
SearchPathW
EnumDateFormatsExA
SetThreadPriorityBoost
GetCurrencyFormatW
HeapAlloc
WriteFileGather
CreateNamedPipeW
Heap32ListFirst
CreateHardLinkW
CopyFileW
DeactivateActCtx
GetCurrentDirectoryA
GlobalLock
EnumResourceLanguagesA
EnumSystemGeoID
GetFileInformationByHandle
FindFirstFileA
IsDBCSLeadByteEx
EnumResourceNamesW
GetCurrentProcessId
GetTempPathW
CreateProcessInternalW
SystemTimeToTzSpecificLocalTime
DeleteTimerQueueTimer
SwitchToThread
FindNextFileW
CreateJobSet
MoveFileA
SetPriorityClass
ShowConsoleCursor
InvalidateConsoleDIBits
GetCurrentActCtx
MoveFileWithProgressA
DeleteTimerQueue
WinExec
SuspendThread
HeapSetInformation
SetCurrentDirectoryW
GetExitCodeProcess
DeleteCriticalSection
GetSystemTime
SetCalendarInfoA
SetCalendarInfoW
GetTimeZoneInformation
GetNumberFormatA
RtlMoveMemory
GetVolumePathNamesForVolumeNameA
PeekConsoleInputW
SetHandleCount
VirtualFreeEx
GetTimeFormatA
SetTapeParameters
GetModuleHandleExA
LZRead
FindFirstChangeNotificationW
ReadConsoleInputExW
GetConsoleDisplayMode
GetConsoleCursorInfo
CompareStringW
HeapQueryInformation
SetSystemTimeAdjustment
WritePrivateProfileSectionW
GetCurrentDirectoryW
OpenWaitableTimerA
CreateSocketHandle
ReleaseActCtx
FindNextVolumeMountPointA
RtlCaptureContext
SetComputerNameExW
GetCommandLineW
MapUserPhysicalPages
ReplaceFile
ReplaceFileA
LockFile
CreateMailslotA
CreateNamedPipeA
Heap32ListNext
ScrollConsoleScreenBufferA
GetVolumeNameForVolumeMountPointA
GetCurrentConsoleFont
InterlockedCompareExchange
GetShortPathNameA
lstrcpyA
GetVersionExA
lstrlen
TransmitCommChar
SetCommBreak
AddAtomW
VirtualUnlock
QueryDosDeviceW
IsBadHugeWritePtr
SetCommMask
EnumTimeFormatsA
GlobalMemoryStatus
ExpandEnvironmentStringsW
LocalFlags
TlsSetValue
IsBadReadPtr
DeleteFileW
CopyLZFile
GetAtomNameW
UnregisterWaitEx
GlobalAlloc
LocalFree
CreateTimerQueueTimer
EnumUILanguagesW
GetFullPathNameA
IsProcessInJob
GetEnvironmentVariableA
GlobalFix
EndUpdateResourceW
GetCPInfo
CreateFileA
BuildCommDCBW
GetLogicalDrives
GetLastError
GetCommState
GetTickCount
GetPrivateProfileSectionNamesW
SetVolumeMountPointW
SetThreadAffinityMask
FindFirstVolumeMountPointW
AddConsoleAliasW
GetStdHandle
EnumSystemLanguageGroupsW
AllocateUserPhysicalPages
TerminateThread
GetCPInfoExW
GetProfileIntW
HeapCompact
lstrcmpW
CompareStringA
QueryPerformanceFrequency
InitializeCriticalSectionAndSpinCount
ReadConsoleW
SetVolumeLabelA
SetCommState
LocalUnlock
AddConsoleAliasA
CreateEventW
DosPathToSessionPathA
WaitForSingleObject
ReadConsoleOutputCharacterW
SetLocaleInfoW
SetSystemPowerState
GetTapePosition
DefineDosDeviceA
PrivCopyFileExW
LZCopy
HeapSize
GetProcessHeap
VirtualQuery
LoadLibraryA
LocalAlloc
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
PathIsSystemFolderA
UrlIsOpaqueW
PathCanonicalizeW
PathSearchAndQualifyA
UrlGetPartW
PathIsUNCServerW
PathRelativePathToW
SHSkipJunction
StrSpnW
SHCreateStreamOnFileA
PathRelativePathToA
PathCompactPathA
SHRegSetPathW
SHQueryInfoKeyW
SHRegDeleteEmptyUSKeyW
SHCreateStreamOnFileW
PathCreateFromUrlA
SHEnumValueW
PathFindSuffixArrayW
StrNCatW
SHOpenRegStream2A
SHOpenRegStream2W
SHRegOpenUSKeyW
SHLoadIndirectString
StrTrimA
StrFromTimeIntervalA
SHRegDeleteUSValueA
PathUnmakeSystemFolderA
StrCmpNW
DllGetVersion
UrlGetLocationA
PathCombineW
SHRegSetUSValueW
PathStripPathW
StrCmpIW
SHRegGetBoolUSValueA
StrToInt64ExW
UrlIsOpaqueA
PathRemoveArgsW
SHRegCloseUSKey
StrCmpLogicalW
UrlGetLocationW
SHRegOpenUSKeyA
PathRemoveBlanksA
StrRChrIW
AssocQueryStringA
SHGetValueA
UrlIsW
PathAddExtensionA
SHRegQueryInfoUSKeyA
UrlCanonicalizeW
PathAppendA
PathGetDriveNumberA
SHRegCreateUSKeyA
StrChrIW
StrToIntExA
PathIsRootA
StrFormatByteSizeW
SHSetValueW
PathBuildRootW
SHRegGetUSValueA
PathRemoveBackslashW
PathIsDirectoryEmptyW
StrChrW
CoGetDefaultContext
CoDosDateTimeToFileTime
SNB_UserMarshal
StringFromGUID2
OleSetAutoConvert
CoSetState
CreateItemMoniker
OleCreateEx
CoGetTreatAsClass
IsValidPtrIn
StgGetIFillLockBytesOnILockBytes
PropStgNameToFmtId
CreateObjrefMoniker
HBITMAP_UserMarshal
MonikerRelativePathTo
OleCreateEmbeddingHelper
HWND_UserSize
GetHookInterface
HMENU_UserSize
CoReleaseServerProcess
CoMarshalHresult
DoDragDrop
PropVariantCopy
WriteFmtUserTypeStg
HPALETTE_UserSize
OleSetContainedObject
CreateClassMoniker
CoGetMarshalSizeMax
PropSysFreeString
CoLoadLibrary
CoQueryAuthenticationServices
CoQueryReleaseObject
HENHMETAFILE_UserFree
CoCopyProxy
OleIsCurrentClipboard
OleConvertIStorageToOLESTREAMEx
OleConvertOLESTREAMToIStorage
OleCreateLinkToFile
UtGetDvtd16Info
HDC_UserFree
CoGetCallContext
CoGetCallerTID
CoFreeUnusedLibraries
DllDebugObjectRPCHook
OpenOrCreateStream
StgGetIFillLockBytesOnFile
CoRevokeClassObject
CoGetObject
HPALETTE_UserMarshal
CoGetInstanceFromIStorage
CoUnloadingWOW
GetHGlobalFromILockBytes
CoGetContextToken
OleCreateFromDataEx
MkParseDisplayName
GetClassFile
OleRegEnumVerbs
CoCancelCall
IsValidPtrOut
CoRegisterClassObject
ComPs_NdrDllUnregisterProxy
StgConvertPropertyToVariant
CoGetPSClsid
OleBuildVersion
CoRegisterMallocSpy
ReadClassStg
IsValidInterface
CoInitializeEx
HICON_UserSize
SNB_UserSize
SetDocumentBitStg
HACCEL_UserUnmarshal
CoInitializeSecurity
CoGetObjectContext
CoGetInstanceFromFile
RevokeDragDrop
IsEqualGUID
HACCEL_UserFree
CoIsOle1Class
OleDestroyMenuDescriptor
WriteClassStg
DcomChannelSetHResult
GetHGlobalFromStream
PrintDlgExW
GetFileTitleA
LoadAlterBitmap
dwLBSubclass
GetFileTitleW
PageSetupDlgW
FindTextA
GetSaveFileNameW
PageSetupDlgA
ChooseColorW
FindTextW
GetSaveFileNameA
ReplaceTextW
GetOpenFileNameA
PrintDlgA
WantArrows
GetOpenFileNameW
ChooseColorA
dwOKSubclass
PrintDlgW
ReplaceTextA
ChooseFontA
ChooseFontW
CommDlgExtendedError
RealGetWindowClassW
AnyPopup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ