Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
Unim3u converter patch.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Unim3u converter patch.exe
Resource
win10v2004-20230220-en
Target
Unim3u converter patch.exe
Size
1.5MB
MD5
75d398fcf7e02f79dba4eafd95790ade
SHA1
3b71085e9c81345daf9010cc816821b7875ef35c
SHA256
605e31a192b97938b289194ed21e3e05a7626285e8b20c5ff246338cebe5d1b9
SHA512
b6a62e2699b910115555012483b69747d27f4645e0b41f3b1d6662eee7a8ca4f5ca5c02d35a1ab3797dcca33efb96cd1edbc23188e808e4c6171a33e4a9abc5d
SSDEEP
24576:YUCTl/dC1/SCf/dhz86GI1lmlxD3GN6A9xUEQatYNTfDfVtykR3tV/q/tP:GQ1/pNB3BjUEQaSNDDtQcdNu
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
SERIALNUMBER=FN 519229 y,CN=Alpiq Digital Austria GmbH,O=Alpiq Digital Austria GmbH,L=Wien,C=AT,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.1=#13045769656e,1.3.6.1.4.1.311.60.2.1.2=#13045769656e,1.3.6.1.4.1.311.60.2.1.3=#13024154
CN=Symantec Class 3 Extended Validation Code Signing CA - G2,OU=Symantec Trust Network,O=Symantec Corporation,C=US
CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=US
SERIALNUMBER=FN 519229 y,CN=Alpiq Digital Austria GmbH,O=Alpiq Digital Austria GmbH,L=Wien,C=AT,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.1=#13045769656e,1.3.6.1.4.1.311.60.2.1.2=#13045769656e,1.3.6.1.4.1.311.60.2.1.3=#13024154
CN=Symantec Class 3 Extended Validation Code Signing CA - G2,OU=Symantec Trust Network,O=Symantec Corporation,C=US
CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ClearEventLogA
ClearEventLogW
CreateProcessAsUserW
EqualDomainSid
LogonUserW
AdjustTokenPrivileges
CryptEncrypt
CheckTokenMembership
CryptImportKey
CryptCreateHash
CryptReleaseContext
PerfDecrementULongCounterValue
GetAclInformation
RegUnLoadKeyW
OpenProcessToken
RegQueryMultipleValuesW
RegDeleteKeyW
FreeSid
InitializeSecurityDescriptor
CryptGetHashParam
ConvertSecurityDescriptorToStringSecurityDescriptorA
AllocateAndInitializeSid
CryptDestroyKey
CryptDestroyHash
RegRestoreKeyW
CredReadW
RegLoadMUIStringW
CryptGenRandom
CredIsMarshaledCredentialA
CryptHashData
LookupPrivilegeValueW
RevertToSelf
RegCreateKeyExW
CryptAcquireContextA
PerfStartProviderEx
ioctlsocket
gethostname
htonl
ntohl
WSAStartup
WSACleanup
WSAGetLastError
sendto
recvfrom
listen
accept
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
send
recv
WSASetLastError
select
__WSAFDIsSet
CertFreeCertificateContext
ord46
ord211
ord60
ord45
ord50
ord41
ord22
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord143
IdnToAscii
IdnToUnicode
GetDriveTypeW
IsValidLocale
LoadLibraryExW
DecodePointer
VerifyVersionInfoA
CreateMailslotW
FindFirstFileNameW
Process32NextW
TerminateProcess
GetConsoleMode
OutputDebugStringW
IsProcessorFeaturePresent
GetTimeZoneInformation
CreateProcessW
WaitForSingleObject
RaiseException
FindClose
MultiByteToWideChar
CreateThread
DeleteFileW
GetLocaleInfoW
InitializeSListHead
IsBadReadPtr
GetModuleFileNameA
LoadLibraryA
GetTickCount64
BindIoCompletionCallback
TlsAlloc
SetCurrentDirectoryW
GetModuleFileNameW
FindNextFileW
WriteConsoleW
FindNextFileA
GetConsoleCP
InitializeCriticalSectionAndSpinCount
PeekNamedPipe
GetThreadPreferredUILanguages
CloseHandle
GetCurrentProcessId
GetStartupInfoW
SetEndOfFile
DeleteCriticalSection
EnterCriticalSection
FlsAlloc
FormatMessageA
GetModuleHandleExW
GetProcessWorkingSetSize
FreeEnvironmentStringsW
RemoveDirectoryW
FindFirstFileExW
ExpandEnvironmentStringsA
GetTimeFormatW
TlsGetValue
CreateEventW
GetModuleHandleA
LeaveCriticalSection
LCMapStringA
CreateFileW
GetVersionExW
VirtualUnlock
HeapAlloc
ExitThread
CreateWaitableTimerW
SetPriorityClass
FlushFileBuffers
CreateMutexW
IsDebuggerPresent
SetUnhandledExceptionFilter
CreateBoundaryDescriptorA
Process32FirstW
FreeLibraryAndExitThread
LoadLibraryW
CreateToolhelp32Snapshot
ReadConsoleW
UnhandledExceptionFilter
CopyFileA
GetLastError
TlsSetValue
CompareStringW
TlsFree
SetLastError
InterlockedFlushSList
GetCPInfo
GetSystemWow64DirectoryW
RtlUnwind
SetConsoleCtrlHandler
VirtualFree
SetEvent
GetProductInfo
GetUserDefaultLCID
SetEnvironmentVariableW
Sleep
EnumSystemLocalesW
GetUserDefaultLangID
LCMapStringW
GetProcessHeap
CreateDirectoryW
WriteFile
SleepEx
OutputDebugStringA
ResetEvent
GetEnvironmentVariableW
GetTickCount
GetACP
SetFilePointerEx
GetConsoleProcessList
GetCurrentDirectoryW
GetFullPathNameA
QueryPerformanceCounter
GetSystemDirectoryA
FileTimeToSystemTime
HeapFree
HeapDestroy
ExitProcess
EnumResourceTypesA
SetEnvironmentVariableA
EncodePointer
GetCommandLineW
GetProcAddress
SetLocaleInfoW
WaitForSingleObjectEx
GetEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetFileType
WideCharToMultiByte
GetFullPathNameW
InterlockedPushEntrySList
RemoveDirectoryTransactedA
GetCurrentThreadId
GetSystemTimeAsFileTime
GetModuleHandleW
WaitForMultipleObjects
GetDateFormatW
HeapSize
FreeLibrary
SetStdHandle
GetFileSize
GetStdHandle
SetCriticalSectionSpinCount
GetCurrentProcess
GetStringTypeW
HeapReAlloc
ReadFile
SystemTimeToTzSpecificLocalTime
GetCurrentThread
FindFirstFileExA
ResumeThread
InitializeCriticalSectionEx
VerSetConditionMask
GetFileAttributesExW
DisableThreadLibraryCalls
GetCommandLineA
UnionRect
InternalGetWindowText
EndDeferWindowPos
PostMessageW
IntersectRect
GetWindowTextA
CheckRadioButton
SendMessageCallbackW
GetMonitorInfoW
FindWindowExW
DialogBoxParamW
EndDialog
GetNextDlgGroupItem
SendMessageW
TranslateAcceleratorW
UnregisterClassW
MessageBoxW
UnregisterClassA
SetWindowPos
SwitchToThisWindow
EnableMenuItem
GetSystemMenu
IsCharUpperW
LoadIconW
GetDlgItem
GetNextDlgTabItem
SetProcessDPIAware
SHGetSpecialFolderPathW
ord80
ord102
SHGetPathFromIDListEx
SHCreateShellItemArray
SHGetIconOverlayIndexA
SysAllocString
GetAltMonthNames
VarCySu
VarUI2FromR8
VarI2FromCy
VarDateFromStr
VarDecFromR8
QueryPathOfRegTypeLi
VarCyFromI1
VarI8FromUI1
VarParseNumFromStr
SysFreeString
StrChrNW
AssocQueryStringByKeyA
StrRStrIA
PathFindFileNameA
PathUnmakeSystemFolderW
PathFileExistsW
SHRegSetUSValueW
SHQueryInfoKeyW
SHCreateShellPalette
StrDupW
PathAppendW
StrCSpnIA
AssocQueryStringA
WTSOpenServerW
WTSUnRegisterSessionNotification
WTSQueryUserToken
WTSEnumerateServersW
WTSVirtualChannelPurgeOutput
CoInitializeEx
CoCreateInstance
CoInitializeSecurity
CoUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ