Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
847096284fc96f099c869ac263ff5a4a120a4f18637550290b0872be5a6eb3c0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
847096284fc96f099c869ac263ff5a4a120a4f18637550290b0872be5a6eb3c0.exe
Resource
win10v2004-20221111-en
Target
847096284fc96f099c869ac263ff5a4a120a4f18637550290b0872be5a6eb3c0
Size
580KB
MD5
17b6b1dc94ec08c204ab91ade5cf4367
SHA1
a5df99f4a2f5d078df072d3c2cc3990b5bb7f23c
SHA256
847096284fc96f099c869ac263ff5a4a120a4f18637550290b0872be5a6eb3c0
SHA512
a46f382f38db43a394013328b25fa1f23c40caac7f32e419373777a1a0c15b56ddb8eddda08a9269dc2aa80f45910a8300350dcff5ec6880d8d83e6fb1bc804e
SSDEEP
12288:HHiwsrR0ZSADvr3B65tDfIqWADbSYFQ7dzPwwKAFI+nSFtC:i2ZSevkT7IqWA/SiQ79PwwKAFIB
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegEnumKeyExW
RegQueryInfoKeyW
CryptVerifySignatureW
CryptDestroyKey
CryptDestroyHash
CryptCreateHash
CryptHashData
CryptGetHashParam
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
InitializeSid
GetSecurityDescriptorControl
GetSidLengthRequired
AddAce
InitializeAcl
SetNamedSecurityInfoW
GetLengthSid
RegOpenKeyExW
CopySid
IsValidSid
RegQueryValueExW
GetSidSubAuthority
MakeSelfRelativeSD
GetSecurityDescriptorLength
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
OpenProcessToken
GetTokenInformation
OpenThreadToken
ConvertSidToStringSidW
MakeAbsoluteSD
CryptAcquireContextW
SetSecurityDescriptorOwner
CryptGenRandom
CryptReleaseContext
SetSecurityDescriptorGroup
InitializeSecurityDescriptor
EqualSid
ConvertStringSidToSidW
SetSecurityDescriptorDacl
GetAclInformation
LookupPrivilegeValueW
AdjustTokenPrivileges
CreateProcessAsUserW
GetSidIdentifierAuthority
GetSidSubAuthorityCount
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
GetTraceLoggerHandle
GetTraceEnableFlags
GetTraceEnableLevel
RegisterTraceGuidsW
UnregisterTraceGuids
TraceEvent
DuplicateTokenEx
RevertToSelf
ImpersonateSelf
RegOpenCurrentUser
ImpersonateLoggedOnUser
RegisterEventSourceW
ReportEventW
DeregisterEventSource
GetSystemTimeAsFileTime
VirtualAlloc
RtlUnwind
Sleep
FreeLibrary
InterlockedExchange
LoadLibraryA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
FileTimeToSystemTime
SystemTimeToFileTime
OutputDebugStringA
GetPrivateProfileIntW
GetPrivateProfileStringW
OutputDebugStringW
CreateFileW
lstrcmpW
SetFilePointer
WaitForSingleObject
CloseHandle
ReleaseMutex
lstrcmpiW
GetLocalTime
CreateEventW
GetCurrentProcessId
LocalFree
FindFirstFileW
FindNextFileW
DeleteFileW
CopyFileW
MoveFileExW
GetFileTime
FlushFileBuffers
ReadFile
GetFileSize
FindClose
CompareFileTime
GetFileAttributesExW
GetStringTypeExW
FormatMessageW
WaitForMultipleObjects
InterlockedCompareExchange
CreateMutexW
GetModuleHandleW
TryEnterCriticalSection
SetEvent
GetVersionExW
lstrcpynW
GetLongPathNameW
GetExitCodeProcess
GetEnvironmentVariableW
CreateDirectoryW
GetFileAttributesW
RemoveDirectoryW
GetTempFileNameW
DuplicateHandle
LoadLibraryW
VirtualQuery
GetTempPathW
DeviceIoControl
ProcessIdToSessionId
GetSystemPowerStatus
OpenProcess
CreateProcessW
GetThreadLocale
VerSetConditionMask
VerifyVersionInfoW
LocalAlloc
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
ReadProcessMemory
WaitForMultipleObjectsEx
WaitForSingleObjectEx
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetPrivateProfileSectionNamesW
QueryDosDeviceW
GetLogicalDriveStringsW
CreateThread
GetComputerNameExW
GetSystemDefaultLangID
GetUserDefaultLangID
LoadLibraryExW
lstrlenA
lstrcmpA
GetStringTypeExA
FormatMessageA
SetFilePointerEx
WriteConsoleW
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
GetCurrentThread
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
GetModuleFileNameW
FlushInstructionCache
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
RtlCaptureContext
ReleaseSemaphore
CreateSemaphoreW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
UnregisterWaitEx
QueryPerformanceFrequency
QueueUserWorkItem
GetFileSizeEx
CreateFileA
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
GetSystemInfo
VirtualProtect
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleA
GetProcAddress
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
FindResourceExW
LockResource
lstrlenW
LoadResource
RaiseException
SetLastError
InterlockedDecrement
GetLastError
FindResourceW
SizeofResource
ResetEvent
CoCreateInstance
IIDFromString
StringFromGUID2
CoTaskMemFree
CoCreateGuid
ReadClassStm
WriteClassStm
CoGetCallContext
CoImpersonateClient
CoRevertToSelf
CoRegisterPSClsid
OleSaveToStream
CoTaskMemAlloc
CoTaskMemRealloc
CoSetProxyBlanket
CoUninitialize
CoInitializeEx
CoGetObject
SafeArrayRedim
SafeArrayDestroy
SafeArrayCreate
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetVartype
SafeArrayUnlock
SafeArrayLock
SafeArrayCopy
SysReAllocStringLen
VarUI4FromStr
VariantChangeType
SysStringByteLen
SysAllocStringByteLen
SysStringLen
VariantInit
VariantClear
SysAllocString
LoadTypeLi
VarBstrCmp
SysAllocStringLen
LoadRegTypeLi
SysFreeString
SetForegroundWindow
GetWindow
SystemParametersInfoW
GetWindowRect
GetParent
GetClientRect
GetWindowLongW
MapWindowPoints
SetWindowPos
PostQuitMessage
GetMessageW
DestroyWindow
AllowSetForegroundWindow
wsprintfW
MessageBoxW
DispatchMessageW
TranslateMessage
PeekMessageW
CharUpperW
CharLowerW
UnregisterClassA
wvsprintfW
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
EnumWindows
GetWindowThreadProcessId
CreateWindowExW
IsWindowVisible
CharLowerBuffA
CharNextA
IsWindow
LoadStringW
CharNextW
RegisterClassExW
GetClassInfoExW
LoadCursorW
CallWindowProcW
DefWindowProcW
KillTimer
SetTimer
SetWindowLongW
SHGetFolderLocation
SHGetDesktopFolder
ord680
SHGetFolderPathW
ShellExecuteExW
CommandLineToArgvW
GetIfTable
NetApiBufferFree
NetWkstaUserGetInfo
NetWkstaGetInfo
EnumProcesses
GetModuleFileNameExW
EnumProcessModules
PathIsRelativeW
SHQueryValueExW
UrlEscapeW
PathCreateFromUrlW
PathRemoveExtensionW
PathRemoveFileSpecW
PathStripPathW
PathCanonicalizeW
PathAddBackslashW
StrRetToStrW
PathFindFileNameW
PathAddExtensionW
PathFindExtensionW
UrlIsW
PathAppendW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
UnloadUserProfile
ExpandEnvironmentStringsForUserW
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSQuerySessionInformationW
WTSFreeMemory
WTSEnumerateSessionsW
CryptUnprotectData
CryptProtectData
CertDuplicateCertificateContext
CryptQueryObject
CertGetNameStringW
CertEnumCertificatesInStore
CertFreeCertificateContext
CertCloseStore
CryptImportPublicKeyInfo
CryptDecodeObjectEx
CryptStringToBinaryA
ImageGetDigestStream
WinVerifyTrust
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE