Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
e4edde35a277fc5dcf82fb67341ca87cc346347a50f65ea13388cc1ca4339a14.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
e4edde35a277fc5dcf82fb67341ca87cc346347a50f65ea13388cc1ca4339a14.exe
Resource
win10v2004-20231023-en
Target
e4edde35a277fc5dcf82fb67341ca87cc346347a50f65ea13388cc1ca4339a14.exe.zip
Size
1.3MB
MD5
f9fac0e8964a788a37cd7f4af833a33a
SHA1
78995ad362138a1bafd1bce80997a7fbdec442b8
SHA256
81dee266586ce2861d82129c94f180b377f964b4ffc9f9e81c0e8e90a65db2a1
SHA512
8744f2e4bff5df8b348dbaff8647e73dc362867c51d83a6fa363796c5f1ec2b141d47e63176360a4ce89b63efbf2c0ab2e70c1976f12ba32843a2d9a1d909646
SSDEEP
24576:3RqOvVCipKLmkyZ0E07xkvyGMQiYTsQYBtegGa+KRRguTM0c7WgXKI12vg433E:BqOdC8KLmkD9GyGMQittDGJKRRggcqmf
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CryptQueryObject
CertCloseStore
CertEnumCertificatesInStore
CryptHashCertificate
CertOpenStore
CertNameToStrW
CertFreeCertificateContext
RtlCaptureContext
RtlLookupFunctionEntry
RtlCaptureStackBackTrace
RtlVirtualUnwind
NtQueryKey
RtlPcToFileHeader
RtlUnwindEx
GetUserNameExW
UnregisterTraceGuids
LookupPrivilegeValueW
GetTokenInformation
EqualSid
DuplicateToken
CreateRestrictedToken
CreateWellKnownSid
CopySid
GetSecurityInfo
SetSecurityInfo
ImpersonateNamedPipeClient
SetKernelObjectSecurity
LookupPrivilegeValueA
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateProcessAsUserW
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegCloseKey
SystemFunction036
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetEntriesInAclW
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
TraceEvent
RegOverridePredefKey
OpenProcessToken
DuplicateTokenEx
GetLengthSid
SetTokenInformation
ConvertStringSidToSidW
RevertToSelf
RegDisablePredefinedCache
SetThreadToken
ConvertSidToStringSidW
GetAce
GetKernelObjectSecurity
GetSecurityDescriptorSacl
DisconnectNamedPipe
GetFileInformationByHandleEx
ReleaseSemaphore
GetUserDefaultUILanguage
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
GetCurrentProcessId
GetCurrentThreadId
CreateFileW
CreateNamedPipeW
WaitNamedPipeW
LocalFree
GetLastError
ConnectNamedPipe
CloseHandle
DuplicateHandle
GetCurrentProcess
SetLastError
ResumeThread
SetEvent
CreateEventW
WaitForMultipleObjects
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FormatMessageA
QueryDosDeviceW
Sleep
HeapCreate
HeapDestroy
WriteFile
OutputDebugStringA
GetModuleFileNameW
DeleteFileW
GetLocalTime
GetCurrentDirectoryW
GetTickCount
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetCommandLineW
GetProcAddress
GetModuleHandleW
GetProcessId
GetSystemInfo
GetProcessTimes
VirtualQueryEx
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
SleepConditionVariableSRW
CreateDirectoryW
ReadFile
GetLongPathNameW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
UnmapViewOfFile
SetFileAttributesW
GetFileAttributesExW
SetCurrentDirectoryW
ReplaceFileW
CopyFileW
GetTempFileNameW
CreateFileMappingW
MapViewOfFile
MoveFileW
SetPriorityClass
TerminateProcess
WaitForSingleObject
OpenProcess
GetExitCodeProcess
SetInformationJobObject
SetHandleInformation
GetStdHandle
AssignProcessToJobObject
CreateSemaphoreW
ExpandEnvironmentStringsW
GetModuleHandleA
SetThreadPriority
QueryThreadCycleTime
TzSpecificLocalTimeToSystemTime
FileTimeToSystemTime
GetCurrentThread
QueryPerformanceFrequency
GetThreadPriority
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
CreateThread
IsDebuggerPresent
ResetEvent
GetVersionExW
GetNativeSystemInfo
VirtualQuery
QueueUserWorkItem
GetUserDefaultLangID
GetFileSizeEx
SetFileTime
SetEndOfFile
GetFileInformationByHandle
SetFilePointerEx
FlushFileBuffers
FindFirstFileW
FindFirstFileExW
FindNextFileW
FindClose
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
GetThreadId
HeapSetInformation
RegisterWaitForSingleObject
UnregisterWaitEx
GetModuleHandleExW
LoadLibraryW
SizeofResource
LockResource
LoadResource
FindResourceW
VirtualFree
SetUnhandledExceptionFilter
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
ReleaseSRWLockShared
AcquireSRWLockShared
QueryFullProcessImageNameW
FreeLibrary
GlobalFree
GetSystemDirectoryW
GetWindowsDirectoryW
VirtualAllocEx
WriteProcessMemory
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetThreadLocale
CreateFileA
GetTimeZoneInformation
CancelIo
VirtualProtectEx
TerminateJobObject
GetUserDefaultLCID
GetFileType
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualFreeEx
CreateJobObjectW
CreateRemoteThread
ReadProcessMemory
DebugBreak
lstrlenW
SearchPathW
WideCharToMultiByte
SetFilePointer
InitOnceExecuteOnce
AddVectoredExceptionHandler
RemoveVectoredExceptionHandler
ReleaseMutex
CreateMutexA
CreateFileMappingA
SleepEx
GetVersion
LockFileEx
UnlockFileEx
SetNamedPipeHandleState
TransactNamedPipe
SetProcessShutdownParameters
SetConsoleCtrlHandler
SuspendThread
GetThreadContext
Wow64GetThreadContext
IsProcessorFeaturePresent
GetSystemDefaultLCID
ReadConsoleW
GetDriveTypeW
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
GetACP
ExitProcess
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
LoadLibraryExW
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
UnhandledExceptionFilter
WaitForSingleObjectEx
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
EncodePointer
GetStringTypeW
MultiByteToWideChar
VirtualProtect
LoadLibraryExA
PeekNamedPipe
CreateProcessW
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
SysAllocString
VariantClear
SysFreeString
SysAllocStringByteLen
GetMappedFileNameW
GetModuleFileNameExW
GetProcessMemoryInfo
EnumProcesses
EnumProcessModulesEx
CommandLineToArgvW
SHGetFolderPathW
SHGetKnownFolderPath
SetTimer
GetMessageW
GetWindowLongPtrW
DispatchMessageW
SetWindowLongPtrW
DestroyWindow
RegisterClassW
CloseDesktop
CloseWindowStation
CreateDesktopW
GetThreadDesktop
CreateWindowExW
PostMessageW
CreateWindowStationW
PeekMessageW
MsgWaitForMultipleObjectsEx
GetQueueStatus
TranslateMessage
KillTimer
PostQuitMessage
UnregisterClassW
DefWindowProcW
GetProcessWindowStation
SetProcessWindowStation
RegisterClassExW
GetUserObjectInformationW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
InternetCheckConnectionW
timeEndPeriod
timeBeginPeriod
timeGetTime
NotifyAddrChange
CancelIPChangeNotify
WinHttpGetIEProxyConfigForCurrentUser
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpAddRequestHeaders
WinHttpSetTimeouts
WinHttpWriteData
WinHttpCrackUrl
WinHttpGetProxyForUrl
WinHttpSetStatusCallback
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpOpenRequest
WinHttpSendRequest
DeleteAtExit
ESETCancelScan
ESETEndScan
ESETInitialize
ESETInitializeSandboxTarget
ESETRegisterTargetProcess
ESETShutdown
ESETStartCleanup
ESETStartSandboxTarget
ESETStartScan
ESETTargetProcessStarted
GetHandleVerifier
IsSandboxedProcess
yr_filemap_map
yr_filemap_map_ex
yr_filemap_map_fd
yr_filemap_unmap
yr_filemap_unmap_fd
yr_finalize
yr_finalize_thread
yr_get_configuration
yr_get_tidx
yr_hash_table_add
yr_hash_table_add_raw_key
yr_hash_table_clean
yr_hash_table_create
yr_hash_table_destroy
yr_hash_table_lookup
yr_hash_table_lookup_raw_key
yr_initialize
yr_object_print_data
yr_rules_define_boolean_variable
yr_rules_define_float_variable
yr_rules_define_integer_variable
yr_rules_define_string_variable
yr_rules_destroy
yr_rules_load
yr_rules_load_stream
yr_rules_save
yr_rules_save_stream
yr_rules_scan_fd
yr_rules_scan_file
yr_rules_scan_mem
yr_rules_scan_mem_blocks
yr_rules_scan_proc
yr_set_configuration
yr_set_tidx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ