Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
67cf719a695ae1b769da9253901c26d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67cf719a695ae1b769da9253901c26d8.exe
Resource
win10v2004-20221111-en
Target
67cf719a695ae1b769da9253901c26d8.exe.vir
Size
5.1MB
MD5
67cf719a695ae1b769da9253901c26d8
SHA1
c148e7823e4bd98060f1b1d402aed070f99b5902
SHA256
296becf74a7989ff8f63a1c572b8b01ff0a7e8472d4d59f31bf9167ed195b2f6
SHA512
52a82db982f67f78558933c2ea5d2df8a88a20fdbedd71fcb0cd367b7c88b91a5388aec1bf5f305b1a0e8c610d489c93149599ee0fe3136d201e2522d50a5a48
SSDEEP
98304:MspkzuYnHDsB7V7UsE/8EI79WFynJih6/BG:M2Su7VSk7wQJc60
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
CN=Beijing Qihu Technology Co.\, Ltd.,O=Beijing Qihu Technology Co.\, Ltd.,ST=Beijing,C=CN
CN=DigiCert SHA2 Assured ID Code Signing CA,OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
ConvertSidToStringSidW
CreateProcessAsUserW
DuplicateTokenEx
FreeSid
GetNamedSecurityInfoW
GetSecurityInfo
GetTokenInformation
GetUserNameW
ImpersonateLoggedOnUser
IsValidSid
LookupAccountNameW
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegLoadKeyW
RegOpenCurrentUser
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
RegUnLoadKeyW
RevertToSelf
SetEntriesInAclW
SetNamedSecurityInfoW
SetSecurityInfo
SystemFunction036
GetOpenFileNameW
BitBlt
CombineRgn
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectW
CreateRectRgn
CreateRectRgnIndirect
DeleteDC
DeleteObject
GdiAlphaBlend
GetCurrentObject
GetDIBits
GetDeviceCaps
GetLayout
GetObjectType
GetObjectW
GetRandomRgn
GetRgnBox
GetStockObject
GetTextExtentPoint32W
IntersectClipRect
LPtoDP
ModifyWorldTransform
OffsetRgn
RectVisible
RestoreDC
SaveDC
SelectClipRgn
SelectObject
SetBkMode
SetDIBColorTable
SetGraphicsMode
SetLayout
SetViewportOrgEx
SetWindowOrgEx
SetWorldTransform
StretchBlt
CreateDispTypeInfo
CreateStdDispatch
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
VarCmp
VarUI4FromStr
VariantChangeType
VariantClear
VariantCopy
VariantInit
PathAppendW
PathCombineW
PathFileExistsW
PathFindExtensionW
PathFindFileNameA
PathFindFileNameW
PathGetDriveNumberW
PathIsDirectoryW
PathMatchSpecW
PathRemoveFileSpecW
SHDeleteKeyW
SHDeleteValueW
SHGetValueA
SHGetValueW
SHSetValueW
StrCpyW
StrStrIW
AdjustWindowRectEx
AllowSetForegroundWindow
AttachThreadInput
BeginPaint
BringWindowToTop
CallWindowProcW
CharNextW
CharUpperW
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageW
DrawIconEx
DrawTextW
EndPaint
FillRect
FindWindowExW
FindWindowW
GetActiveWindow
GetAsyncKeyState
GetCapture
GetClassInfoExW
GetClassNameW
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetFocus
GetForegroundWindow
GetIconInfo
GetKeyState
GetMessageExtraInfo
GetMessagePos
GetMessageW
GetMonitorInfoW
GetParent
GetShellWindow
GetSystemMetrics
GetWindow
GetWindowLongW
GetWindowRect
GetWindowTextW
GetWindowThreadProcessId
InflateRect
IntersectRect
InvalidateRect
InvalidateRgn
IsIconic
IsWindow
IsWindowVisible
KillTimer
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MapWindowPoints
MessageBoxW
MonitorFromWindow
MoveWindow
PostMessageW
PostQuitMessage
PtInRect
RegisterClassExW
RegisterClassW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageTimeoutW
SendMessageW
SetActiveWindow
SetCapture
SetCursor
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetTimer
SetWindowLongW
SetWindowPos
SetWindowTextW
SetWindowsHookExW
ShowWindow
SystemParametersInfoW
TrackMouseEvent
TranslateMessage
UnhookWindowsHookEx
UnregisterClassW
UpdateLayeredWindow
UpdateWindow
WindowFromDC
wsprintfW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
timeGetTime
EnumProcesses
GetModuleFileNameExW
GetModuleInformation
GetProcessImageFileNameW
AssignProcessToJobObject
CancelWaitableTimer
CloseHandle
CompareStringW
CopyFileW
CreateDirectoryW
CreateEventW
CreateFileA
CreateFileMappingW
CreateFileW
CreateJobObjectW
CreateMutexW
CreateProcessW
CreateRemoteThread
CreateSemaphoreW
CreateThread
CreateToolhelp32Snapshot
CreateWaitableTimerW
DecodePointer
DeleteCriticalSection
DeleteFileW
DeviceIoControl
EncodePointer
EnterCriticalSection
EnumResourceNamesW
EnumSystemLocalesW
ExitProcess
ExitThread
ExpandEnvironmentStringsW
FindClose
FindFirstFileExW
FindFirstFileW
FindNextFileW
FindResourceExW
FindResourceW
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
FreeResource
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetDriveTypeW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileSize
GetFileSizeEx
GetFileTime
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoW
GetLogicalDriveStringsW
GetLongPathNameA
GetLongPathNameW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetNativeSystemInfo
GetOEMCP
GetPrivateProfileIntW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetProcessId
GetProcessTimes
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetThreadContext
GetThreadPriority
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetUserDefaultLangID
GetUserDefaultUILanguage
GetVersionExW
GetWindowsDirectoryW
HeapAlloc
HeapDestroy
HeapFree
HeapLock
HeapReAlloc
HeapSize
HeapUnlock
HeapWalk
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedDecrement
InterlockedIncrement
InterlockedPopEntrySList
InterlockedPushEntrySList
IsBadReadPtr
IsBadWritePtr
IsDebuggerPresent
IsProcessInJob
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
IsWow64Process
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockResource
MapViewOfFile
MoveFileExW
MoveFileW
MultiByteToWideChar
OpenMutexW
OpenProcess
OpenThread
OutputDebugStringA
OutputDebugStringW
Process32FirstW
Process32NextW
QueryInformationJobObject
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadConsoleW
ReadFile
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
ReplaceFileW
ResetEvent
ResumeThread
RtlCaptureStackBackTrace
RtlUnwind
SetCurrentDirectoryW
SetEndOfFile
SetEnvironmentVariableW
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetFileTime
SetHandleInformation
SetInformationJobObject
SetLastError
SetStdHandle
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
SizeofResource
Sleep
SuspendThread
SwitchToThread
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
TzSpecificLocalTimeToSystemTime
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
WritePrivateProfileStringW
lstrcmpA
lstrcmpiA
lstrcmpiW
lstrcpynW
lstrlenA
lstrlenW
CoCreateInstance
CoInitialize
CoInitializeEx
CoSetProxyBlanket
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
DoDragDrop
OleInitialize
OleUninitialize
PropVariantClear
RegisterDragDrop
RevokeDragDrop
NdrClientCall2
RpcBindingFromStringBindingW
RpcStringBindingComposeW
GetUserNameExW
InitCommonControlsEx
GdipAlloc
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCloneImage
GdipCreateBitmapFromFile
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipCreateImageAttributes
GdipDeleteGraphics
GdipDisposeImage
GdipDisposeImageAttributes
GdipDrawImageI
GdipDrawImagePointRectI
GdipDrawImageRectRectI
GdipFree
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipGetImageGraphicsContext
GdipGetImageHeight
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageWidth
GdipSaveImageToFile
GdipSetImageAttributesColorMatrix
GdipSetImageAttributesWrapMode
GdipSetInterpolationMode
GdipSetSmoothingMode
GdiplusShutdown
GdiplusStartup
CreateEnvironmentBlock
DestroyEnvironmentBlock
Netbios
??4ShellResourceRequestDetails@@QAEAAU0@ABU0@@Z
?Wide2ASCII@installer@@YA?AV?$basic_string@DU?$char_traits@D@__1@std@@V?$allocator@D@23@@__1@std@@ABV?$basic_string@_WU?$char_traits@_W@__1@std@@V?$allocator@_W@23@@34@@Z
GetHandleVerifier
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE