Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Target
ActionLauncher.exe
Size
517KB
MD5
bc380e41db94d5bc6b6973bd6c7b0fd5
SHA1
6e608316c7c76a5a43fd9a99c43637b205c71c65
SHA256
c416c6e72cf23e2d8f4063bd8fcacde798e3e2f5f59c4071dc2a9231a484eb5b
SHA512
fbd93ea80ccac191be0f79051bb77cf984b08c9d73e34bc1c1be23e2c3452f260a065bca08425537ae7d97f883c003f5a19947374d8fd55f271038e829b51966
SSDEEP
6144:N/RwiO5lwfRMA0WxOiRxkUt7JzJ9LMMMMMMMMMMMM2/wD:NFfRrlMMMMMMMMMMMM2oD
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftKernelCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Process32FirstW
CreateSemaphoreW
ProcessIdToSessionId
IsWow64Process
Process32NextW
GetModuleHandleA
CreateToolhelp32Snapshot
OpenSemaphoreW
CloseHandle
GetCurrentProcessId
LocalFree
CreateThread
InterlockedDecrement
GetSystemDirectoryW
GetProcAddress
GetLastError
ReleaseSemaphore
CompareStringW
GetModuleFileNameW
GetProcessHeap
HeapFree
lstrlenA
MultiByteToWideChar
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
TerminateProcess
GetVersionExW
GetSystemPowerStatus
Sleep
LoadLibraryW
OpenProcess
GetModuleHandleW
WaitForSingleObject
GetCurrentProcess
CreateProcessW
FreeLibrary
InterlockedExchange
GetCommandLineW
IsWindowVisible
DefWindowProcW
DispatchMessageW
GetWindowRect
SendInput
PostQuitMessage
LoadCursorW
MessageBoxW
WaitMessage
TranslateMessage
RegisterClassExW
LoadIconW
SetCursorPos
PeekMessageW
GetCursorPos
IsWindow
FindWindowExW
CreateWindowExW
FindWindowW
RegSetValueExW
AdjustTokenPrivileges
CheckTokenMembership
RegOpenKeyExW
FreeSid
AllocateAndInitializeSid
RegGetValueW
RegDeleteValueW
LookupPrivilegeValueW
RegCreateKeyExW
GetTokenInformation
OpenProcessToken
CreateWellKnownSid
LookupAccountSidW
ConvertSidToStringSidW
RegCloseKey
CommandLineToArgvW
SHGetFolderPathW
CoCreateInstance
CoUninitialize
CoInitializeEx
CoInitializeSecurity
SysFreeString
VariantInit
SysAllocString
VariantClear
_CxxThrowException
__CxxFrameHandler3
malloc
?_type_info_dtor_internal_method@type_info@@QAEXXZ
free
memset
_controlfp_s
_invoke_watson
_wtoi
_wgetenv
_wfopen
wcsstr
wcspbrk
_vsnwprintf
??3@YAXPAX@Z
fclose
exit
??2@YAPAXI@Z
??_V@YAXPAX@Z
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?substr@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBE?AV12@II@Z
??A?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAA_WI@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
WTSFreeMemory
WTSEnumerateProcessesW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ