Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
retrohunt_586eb933e2123d683f8ce8da2aece5a2094dca72be0a1ded18210c12351451ac.exe
Resource
win7-20230712-en
Target
retrohunt_586eb933e2123d683f8ce8da2aece5a2094dca72be0a1ded18210c12351451ac
Size
2.6MB
MD5
3fe9004fb195d4e350d91b342c00c5c3
SHA1
809838d515e90619bdd17fdcaa12c732d98c5dee
SHA256
586eb933e2123d683f8ce8da2aece5a2094dca72be0a1ded18210c12351451ac
SHA512
c0b9272c2dd7609c6fbc3ff3484b7c94a0e476fa88379bd783079a34a35ba1d31f1c635c20309cce983be79811cd6866499037dc0be41164bc2b133215dfc456
SSDEEP
12288:YlQ42wwLHqpVxTXLqVrytXS/eVYkfgn6ggK8:q2wwTEmy5Sm2kfg938
ExtKeyUsageCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sleep
GetLastError
GetModuleHandleW
LoadLibraryA
GetProcAddress
CreateMutexA
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCommandLineA
GetSystemTimeAsFileTime
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
MultiByteToWideChar
ReadFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetFilePointer
CloseHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
RaiseException
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleHandleA
HeapSize
FlushFileBuffers
CreateFileA
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateThread
LocalFree
GetTimeZoneInformation
GetSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
CompareFileTime
DosDateTimeToFileTime
FileTimeToDosDateTime
GetLocalTime
lstrcpyW
MulDiv
GetFullPathNameW
GetFullPathNameA
GetCurrentDirectoryW
MoveFileW
CopyFileW
CopyFileA
GetFileAttributesW
DeleteFileW
FindFirstFileW
SetEvent
OpenEventA
OutputDebugStringA
OutputDebugStringW
UnmapViewOfFile
GetSystemInfo
MapViewOfFile
CreateFileMappingA
GetCurrentThread
OpenFileMappingA
FindClose
GetModuleFileNameW
GetTempPathW
CreateFileW
GetFileSize
lstrcpynW
lstrlenW
WinExec
GetWindowsDirectoryW
LoadLibraryW
FreeLibrary
GetCurrentDirectoryA
FindNextFileW
CreateDirectoryW
SetCurrentDirectoryW
SetCurrentDirectoryA
SetFileAttributesW
RemoveDirectoryW
FindNextFileA
FindFirstFileA
InitializeCriticalSection
DeleteFileA
MoveFileA
GetFileAttributesA
FormatMessageA
GetTempPathA
VirtualQuery
lstrlenA
DebugBreak
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
LocalAlloc
GetSystemDirectoryA
GetVersionExA
SetFileTime
GetFileTime
GetComputerNameA
SetFileAttributesA
CreateDirectoryA
LoadCursorFromFileA
GetQueueStatus
IsCharAlphaNumericA
GetCursor
IsCharUpperA
CharNextW
GetSysColor
GetKeyState
DdeCmpStringHandles
GetProcessWindowStation
ReleaseDC
SetProcessDefaultLayout
ArrangeIconicWindows
BlockInput
RealGetWindowClassA
IntersectRect
UnionRect
OffsetRect
GetSystemMetrics
GetAsyncKeyState
InflateRect
EqualRect
SetRect
SetRectEmpty
PtInRect
CopyRect
SubtractRect
IsRectEmpty
wsprintfW
SendMessageW
GetFocus
RegisterWindowMessageW
LoadCursorW
CopyIcon
IsWindow
SetCursor
GetMessagePos
MessageBeep
SetWindowLongW
DestroyCursor
FillPath
DeleteDC
EndPage
EndPath
CreateHalftonePalette
DeleteEnhMetaFile
CreateMetaFileA
EndDoc
CreateSolidBrush
CloseMetaFile
DeleteColorSpace
CreateMetaFileW
CreateCompatibleDC
CloseFigure
FlattenPath
CreatePatternBrush
DeleteObject
DeleteMetaFile
GetSystemPaletteUse
AbortDoc
GetPolyFillMode
GetStockObject
RealizePalette
GetColorSpace
GetTextExtentExPointW
GdiCleanCacheDC
GdiEntry7
GdiStartDocEMF
SetBitmapBits
CreateRoundRectRgn
STROBJ_bGetAdvanceWidths
GdiDescribePixelFormat
GetTextFaceAliasW
SetRelAbs
XLATEOBJ_cGetPalette
GetDeviceCaps
CreateDCW
GetUserNameA
RegOpenKeyA
RegQueryValueExA
SetThreadToken
RegCloseKey
RegQueryValueW
RegOpenKeyExW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyExA
RegCreateKeyExA
CryptAcquireContextA
CryptDestroyKey
CryptReleaseContext
CryptGenKey
CryptGenRandom
RegDeleteValueA
RegEnumValueA
RegSetValueExA
RegSetValueExW
CryptGetProvParam
CryptEnumProvidersA
CryptGetUserKey
CryptDestroyHash
CryptCreateHash
CryptGetHashParam
CryptHashData
CryptExportKey
CryptImportKey
CryptDeriveKey
OpenThreadToken
RevertToSelf
ExtractAssociatedIconA
SHCreateProcessAsUserW
SHGetDiskFreeSpaceA
ShellExecuteW
ShellExecuteExW
ExtractIconW
CoTaskMemFree
StringFromCLSID
PathFindFileNameW
PathRemoveFileSpecW
PathCombineW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ