Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
294d95862874cf252b30fb23b36bf7882d8871508ab7a26ecf60f4a85043c795.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
294d95862874cf252b30fb23b36bf7882d8871508ab7a26ecf60f4a85043c795.exe
Resource
win10v2004-20230915-en
Target
294d95862874cf252b30fb23b36bf7882d8871508ab7a26ecf60f4a85043c795
Size
13.1MB
MD5
e7af4466a22fb2363ef279992979fb33
SHA1
b01aeb56e289eb3fefab4d4d5c352b808cc86ff2
SHA256
294d95862874cf252b30fb23b36bf7882d8871508ab7a26ecf60f4a85043c795
SHA512
7ff4d200a79bacc18c5c993c62a9b652098b6fbfffbd533373a0d7d4d1f22e5acd8c7b6824ab2e1bd5f918d9eaec4448fdb79a3e3cc2821e0f30b35827fb492d
SSDEEP
393216:WUvp4nD6kbLSftXdEKMDw3FPcM94W/9eAjY:PhmD7SflOpDw3FTH/3Y
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
IsBadWritePtr
SetStdHandle
GetOEMCP
GetCPInfo
GetStartupInfoA
IsBadCodePtr
GetStringTypeA
GetStringTypeW
GetDriveTypeA
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
InterlockedExchange
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
HeapSize
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapReAlloc
CreateFileA
GetFileType
GetSystemTimeAsFileTime
CreateThread
ExitThread
RtlUnwind
ExitProcess
GetStartupInfoW
GetCurrentDirectoryW
GetFileTime
GetFileAttributesW
SetErrorMode
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
GlobalFlags
DeleteCriticalSection
InitializeCriticalSection
RaiseException
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetModuleFileNameW
GetFullPathNameW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
lstrcmpiW
InterlockedDecrement
MulDiv
lstrcpynW
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetModuleHandleA
LoadLibraryA
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
FreeResource
lstrcmpiA
lstrlenA
lstrcmpA
lstrcpyW
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
GetTickCount
GlobalFree
GlobalAlloc
SetLastError
GetSystemDefaultLangID
GetTempPathW
MoveFileW
FormatMessageW
WideCharToMultiByte
GetVolumeInformationW
lstrlenW
lstrcatW
GetCurrentThread
LocalAlloc
LocalFree
GetLastError
GetProcessHeap
HeapAlloc
GetModuleHandleW
HeapFree
GetCurrentProcess
LoadLibraryW
GetProcAddress
FreeLibrary
CopyFileW
MoveFileExW
DeviceIoControl
Sleep
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
TerminateProcess
CreateFileW
GetWindowsDirectoryW
SetFileAttributesW
GetExitCodeProcess
WritePrivateProfileStringW
MultiByteToWideChar
DeleteFileW
GetPrivateProfileIntW
CreateDirectoryW
GetSystemDirectoryW
GetPrivateProfileStringW
FindResourceW
LoadResource
LockResource
SizeofResource
CreateProcessW
WaitForSingleObject
CloseHandle
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
IsBadReadPtr
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableW
SetRect
IsRectEmpty
CharNextW
ReleaseCapture
SetCapture
GetSysColorBrush
DestroyMenu
SetWindowContextHelpId
MapDialogRect
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
wsprintfW
CharUpperW
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetMenuItemBitmaps
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapW
ShowWindow
MoveWindow
SetWindowTextW
SetDlgItemTextW
RegisterWindowMessageW
WinHelpW
GetCapture
CreateWindowExW
SetWindowsHookExW
CallNextHookEx
GetClassInfoExW
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SendDlgItemMessageW
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
MessageBoxW
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageW
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
EqualRect
GetClassInfoW
RegisterClipboardFormatW
PostThreadMessageW
RegisterClassW
UnregisterClassW
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
PtInRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetWindowLongW
IsWindowEnabled
GetNextDlgTabItem
EndDialog
CharUpperA
CharNextA
ExitWindowsEx
GetParent
GetFocus
GetDlgItem
GetSystemMetrics
LoadIconW
GetClientRect
IsIconic
GetSystemMenu
DrawIcon
LoadCursorW
SetCursor
ClientToScreen
GetWindowRect
SendMessageW
EnableWindow
IsDialogMessageW
PtVisible
GetWindowExtEx
GetViewportExtEx
RectVisible
TextOutW
ExtTextOutW
Escape
GetRgnBox
GetTextColor
GetBkColor
GetMapMode
CreateRectRgnIndirect
GetDeviceCaps
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
DeleteObject
SetMapMode
CreateFontW
CreateSolidBrush
GetClipBox
SetTextColor
SetBkColor
GetObjectW
CreateBitmap
SaveDC
RestoreDC
SelectObject
GetFileTitleW
OpenPrinterW
DocumentPropertiesW
ClosePrinter
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegEnumValueW
RegCreateKeyW
RegCreateKeyExA
SetFileSecurityW
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
RegQueryValueW
RegDeleteKeyW
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyW
RegOpenKeyW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCreateKeyExW
RegSetValueW
ImpersonateSelf
OpenThreadToken
RegCloseKey
AllocateAndInitializeSid
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
LookupAccountNameW
GetFileSecurityW
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
EqualSid
AddAce
ShellExecuteW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
ord17
ImageList_Destroy
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFileExistsW
PathFindFileNameW
OleUIBusyW
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
StgOpenStorageOnILockBytes
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
SysFreeString
OleCreateFontIndirect
SysAllocString
SystemTimeToVariantTime
SafeArrayDestroy
VariantCopy
VariantInit
VariantChangeType
SysAllocStringLen
SysStringLen
VariantClear
ord23
ord21
ord20
ord22
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ