Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ee4a79d1cf814aa11826730e243dc452aba88bb5c03bb29d73bf11eb32268599.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ee4a79d1cf814aa11826730e243dc452aba88bb5c03bb29d73bf11eb32268599.exe
Resource
win10v2004-20230831-en
Target
ee4a79d1cf814aa11826730e243dc452aba88bb5c03bb29d73bf11eb32268599
Size
2.7MB
MD5
efe4fa2352c0b88481cde339291a4098
SHA1
42da2b91f021e56b4d89eabf07c4737b4df722ec
SHA256
ee4a79d1cf814aa11826730e243dc452aba88bb5c03bb29d73bf11eb32268599
SHA512
f50c96403c8c94ad4ce6d7aea514d77edc9ff54bfb4cb20d831dc63895b6518472890dd626fc617a42c31df58ce10710800c4a4a942260590524e582c5b29844
SSDEEP
49152:mB4xZUlKBJ+m1iMfFGw/lmEUmsIyiCaT7sS0lBI7OOPI7NraiU5o0OX8LuiWs8Q:mB4xZdf++NAGmqsLp97Nrai50OX
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathIsUNCW
PathFileExistsW
PathStripToRootW
PathFindFileNameW
FormatMessageW
EncodePointer
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpW
GlobalAddAtomW
GlobalFindAtomW
GetFileAttributesW
GetFileAttributesExW
GetFileSizeEx
GetFileTime
SetFileAttributesW
SystemTimeToTzSpecificLocalTime
SetErrorMode
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
lstrcmpA
GlobalFlags
GetVersionExW
CompareStringW
GetLocaleInfoW
GetCurrentDirectoryW
GetUserDefaultLCID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
CreateDirectoryW
OpenProcess
GetExitCodeProcess
CreateProcessW
GlobalLock
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetLongPathNameW
GlobalFree
ReleaseMutex
CreateMutexW
DeviceIoControl
SetPriorityClass
VerSetConditionMask
RtlUnwind
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
GetFileType
HeapQueryInformation
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
ExitProcess
GetStdHandle
FindFirstFileExW
GetStringTypeW
GetTimeZoneInformation
LCMapStringW
IsValidLocale
EnumSystemLocalesW
SetStdHandle
WriteConsoleW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
GetDriveTypeW
GetSystemDirectoryA
SleepEx
GetFileAttributesExA
QueryPerformanceFrequency
GlobalAlloc
LoadLibraryA
LoadLibraryExW
DuplicateHandle
UnlockFile
SetEndOfFile
LockFile
GetVolumeInformationW
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
CreateThread
lstrcpyW
GlobalUnlock
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
Sleep
CloseHandle
CreateEventW
GetCurrentProcessId
GetLocalTime
GetModuleFileNameW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
GetTempPathW
CreateFileW
MoveFileExW
GetFileInformationByHandle
SetFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
FileTimeToDosDateTime
DosDateTimeToFileTime
CreateFileA
SetFileAttributesA
GetFileAttributesA
GetFileSize
WriteFile
ReadFile
SetFilePointer
DeleteFileW
GetLastError
FindClose
SystemTimeToFileTime
FileTimeToSystemTime
GetTickCount
FindFirstFileW
MoveFileW
GetSystemDirectoryW
lstrlenW
CopyFileW
GetProcAddress
LocalAlloc
LocalFree
HeapAlloc
HeapFree
GetProcessHeap
GetCurrentProcess
GetFullPathNameW
FlushFileBuffers
LoadLibraryW
GetModuleHandleA
SetLastError
OutputDebugStringA
GetACP
MultiByteToWideChar
GetModuleHandleW
FindNextFileW
LockResource
LoadResource
SizeofResource
FindResourceW
RemoveDirectoryW
WideCharToMultiByte
DecodePointer
VerifyVersionInfoA
ExpandEnvironmentStringsA
WaitForMultipleObjects
PeekNamedPipe
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
FormatMessageA
GetSystemTime
FlushConsoleInputBuffer
GlobalMemoryStatus
ReadConsoleInputA
SetConsoleMode
wsprintfW
PostQuitMessage
LoadBitmapW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
DestroyMenu
RealChildWindowFromPoint
ClientToScreen
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
LoadCursorW
GetSysColorBrush
ReleaseDC
GetDC
GetWindowThreadProcessId
SetWindowTextW
IsWindowEnabled
IsWindow
MessageBoxA
GetMonitorInfoW
WinHelpW
LoadIconW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetLastActivePopup
GetTopWindow
GetClassNameW
GetClassLongW
SetWindowLongW
PtInRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
MessageBoxW
AdjustWindowRectEx
GetWindowRect
RemovePropW
GetPropW
SetPropW
GetUserObjectInformationW
GetProcessWindowStation
GetClientRect
SetRectEmpty
OffsetRect
GetParent
CharUpperW
GetSystemMetrics
GetSubMenu
GetMenuItemID
GetMenuItemCount
SendMessageW
RedrawWindow
ValidateRect
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
SetMenu
GetMenu
EnableWindow
GetCapture
GetKeyState
GetFocus
GetDlgCtrlID
GetDlgItem
IsIconic
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPos
DestroyWindow
IsMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
PostMessageW
GetMessageTime
GetMessagePos
PeekMessageW
DispatchMessageW
RegisterWindowMessageW
GetWindow
GetWindowLongW
GetScrollPos
GetWindowTextW
MonitorFromWindow
CryptEnumProvidersA
RegOpenKeyW
DuplicateTokenEx
LookupAccountSidW
GetTokenInformation
ImpersonateLoggedOnUser
RegEnumKeyW
RegCreateKeyExW
DeregisterEventSource
RegisterEventSourceA
ReportEventA
CryptAcquireContextA
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
LookupAccountNameW
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
InitializeSecurityDescriptor
AddAccessAllowedAce
GetAce
AddAce
GetAclInformation
InitializeAcl
GetLengthSid
EqualSid
OpenProcessToken
RevertToSelf
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
CryptCreateHash
CryptDestroyHash
CryptSignHashA
SHGetFolderPathW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
CoCreateInstance
CoUninitialize
CoInitialize
URLDownloadToFileW
ord13
ord23
ord22
ord21
ord20
ord14
ord11
ord10
InternetSetFilePointer
InternetReadFile
InternetOpenUrlW
InternetCloseHandle
InternetOpenW
HttpQueryInfoW
CreateStdAccessibleObject
LresultFromObject
SetMapMode
SelectObject
SaveDC
RestoreDC
ScaleWindowExtEx
PtVisible
GetStockObject
RectVisible
GetClipBox
Escape
DeleteObject
DeleteDC
CreateBitmap
SetTextColor
SetBkColor
GetDeviceCaps
TextOutW
ExtTextOutW
ScaleViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
SetViewportOrgEx
SetViewportExtEx
OpenPrinterW
ClosePrinter
DocumentPropertiesW
VariantInit
VariantClear
VariantChangeType
CertDuplicateCertificateContext
CertEnumCertificatesInStore
CertOpenStore
CertFreeCertificateContext
CertFindCertificateInStore
CertCloseStore
CertGetCertificateContextProperty
ord22
ord26
ord27
ord32
ord33
ord35
ord41
ord30
ord200
ord301
ord50
ord60
ord143
ord217
ord79
ord211
ord46
bind
send
connect
getpeername
recv
getsockopt
htons
ntohs
WSASetLastError
WSAIoctl
WSAStartup
WSACleanup
getaddrinfo
freeaddrinfo
accept
listen
recvfrom
setsockopt
ioctlsocket
gethostname
shutdown
htonl
gethostbyname
getservbyname
select
__WSAFDIsSet
socket
WSAGetLastError
getsockname
closesocket
sendto
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE