Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
f8a54a47dca5a7de477d869a549679a10fb2e60d93c6ab648231cda812128fd6.exe
Resource
win7-20230712-en
Target
f8a54a47dca5a7de477d869a549679a10fb2e60d93c6ab648231cda812128fd6
Size
2.7MB
MD5
aac5fc030c8e8f551b7f29c69004a4f0
SHA1
d13e9b6d09ba64a320ced29bab619eab505e8217
SHA256
f8a54a47dca5a7de477d869a549679a10fb2e60d93c6ab648231cda812128fd6
SHA512
296ddfd1a6953bd36ad415b60bfa4058a5a57cb1b5ebb0b068141a3b779bc760c30003d310f5bd4ac75612de99851f755dab80be6c79fbd6498b753537bbcec3
SSDEEP
12288:Shum52wwLHqpVxTXLqVrytXS/eMAdIiftnui:A2wwTEmy5SmvL
ExtKeyUsageCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedDecrement
InterlockedIncrement
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetVersion
GetLastError
SetEvent
CompareStringW
WaitForSingleObject
CreateEventW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
RtlUnwind
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
SetUnhandledExceptionFilter
CreateDirectoryExW
GetWriteWatch
EnumTimeFormatsW
FindResourceA
GetCommState
CreateMailslotW
GetWindowsDirectoryW
BeginUpdateResourceW
LCMapStringA
LocalReAlloc
LocalFlags
WriteConsoleOutputAttribute
CreateFileW
RequestWakeupLatency
UnregisterWaitEx
GetConsoleDisplayMode
HeapValidate
IsBadReadPtr
GetModuleFileNameW
lstrlenW
GetDriveTypeW
GetLogicalDrives
lstrcmpW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
ExitProcess
InitializeCriticalSection
GetCommandLineW
ReleaseMutex
ResetEvent
WaitForMultipleObjectsEx
SetErrorMode
CreateMutexW
CreateProcessW
MoveFileExW
GetSystemInfo
CreateFileA
ReadFile
SetFilePointer
DosDateTimeToFileTime
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryW
WideCharToMultiByte
ReleaseSemaphore
WaitForMultipleObjects
CreateThread
CreateSemaphoreW
VirtualFree
VirtualAlloc
SetFilePointerEx
ExpandEnvironmentStringsW
SystemTimeToFileTime
GetSystemTime
SetFileTime
SetEndOfFile
WriteFile
LocalFree
lstrlenA
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
GetFileSizeEx
FindClose
FindFirstFileW
GetFileAttributesW
CreateDirectoryW
GetTempPathW
GlobalFree
GlobalAlloc
GetFileAttributesExW
CopyFileW
CreateHardLinkW
SetFileAttributesW
DeleteFileW
GetTempPathA
GetFileTime
FindNextFileW
GetStdHandle
GetCurrentThread
RemoveDirectoryW
FormatMessageA
GetComputerNameW
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
IsDebuggerPresent
RaiseException
GetCPInfo
GetACP
GetOEMCP
LCMapStringW
LoadLibraryA
HeapReAlloc
GetLocaleInfoA
HeapSize
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
GetModuleHandleW
SendMessageW
FindWindowW
OemToCharA
MapVirtualKeyW
DefMDIChildProcW
GetMonitorInfoW
BroadcastSystemMessageA
UnregisterDeviceNotification
SetWindowWord
OemToCharBuffA
GetMenuDefaultItem
DestroyWindow
TrackPopupMenu
WindowFromPoint
MessageBoxA
DrawTextW
GetMenuItemID
ScrollWindowEx
GetMenuInfo
DlgDirSelectExA
LoadAcceleratorsW
DdeInitializeA
SetProcessWindowStation
CharToOemBuffA
GetLastInputInfo
GetScrollBarInfo
SetSysColors
MessageBoxExA
DdeCreateStringHandleA
DefDlgProcA
LoadCursorFromFileA
SetPaletteEntries
HT_Get8BPPMaskPalette
GetMapMode
DeleteMetaFile
PATHOBJ_vEnumStart
EngCreateDeviceBitmap
CLIPOBJ_bEnum
SetRelAbs
ScaleViewportExtEx
GdiCleanCacheDC
GetLayout
GdiGetCodePage
RectVisible
GetWinMetaFileBits
ResizePalette
GdiConvertRegion
GetCharWidthA
CreateDCW
InvertRgn
TranslateCharsetInfo
GetTextFaceW
GetTextMetricsA
RemoveFontResourceW
GdiRealizationInfo
XFORMOBJ_bApplyXform
EnumEnhMetaFile
RectInRegion
EndDoc
DeleteColorSpace
FillPath
DeleteEnhMetaFile
CreateCompatibleDC
CreateSolidBrush
FlattenPath
CreateHalftonePalette
CreateMetaFileA
CreatePatternBrush
DeleteObject
EndPage
EndPath
CloseFigure
DeleteDC
CreateMetaFileW
CloseMetaFile
RealizePalette
GetColorSpace
GetStockObject
GetEnhMetaFileA
TraceMessage
RegCloseKey
RegEnumKeyExW
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
SetThreadToken
RegEnumValueW
RegQueryValueExW
RegNotifyChangeKeyValue
SetServiceStatus
StartServiceCtrlDispatcherW
DuplicateToken
RegDeleteValueW
RegisterServiceCtrlHandlerW
CryptDestroyHash
CryptCreateHash
CryptGetHashParam
CryptHashData
FreeSid
AllocateAndInitializeSid
LookupAccountNameW
ConvertStringSecurityDescriptorToSecurityDescriptorW
CheckTokenMembership
OpenThreadToken
RegDeleteKeyW
SetFileSecurityW
CryptAcquireContextW
CryptReleaseContext
RegOpenKeyA
RegQueryValueExA
GetUserNameA
WOWShellExecute
SHCreateDirectoryExA
CommandLineToArgvW
SHGetPathFromIDList
SHQueryRecycleBinW
ExtractAssociatedIconExW
SHAppBarMessage
SHBrowseForFolderW
ShellExecuteA
ExtractIconA
CheckEscapesW
SHCreateDirectoryExW
ShellHookProc
DragQueryFile
DoEnvironmentSubstA
SHGetDataFromIDListA
SHEmptyRecycleBinA
ExtractAssociatedIconA
FindExecutableW
SHLoadInProc
SHEmptyRecycleBinW
SHFreeNameMappings
SHGetSpecialFolderPathA
DragQueryFileW
FindExecutableA
ExtractAssociatedIconExA
SHGetInstanceExplorer
SHFormatDrive
SHGetFileInfoA
SHFileOperationW
ExtractIconExA
SHBrowseForFolder
SHPathPrepareForWriteW
SHGetSpecialFolderPathW
CoUninitialize
CLSIDFromString
CoRegisterClassObject
CreateBindCtx
CoRevokeClassObject
CoInitializeEx
StrRStrIW
StrRChrW
StrStrA
StrCmpNA
StrChrIW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ