Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
85fa440859a6698e10d64c12120fc56607f70498a8e89471740c13021d31edfa.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
85fa440859a6698e10d64c12120fc56607f70498a8e89471740c13021d31edfa.exe
Resource
win10v2004-20231127-en
Target
85fa440859a6698e10d64c12120fc56607f70498a8e89471740c13021d31edfa
Size
2.0MB
MD5
d4b3d7ca4acfe586664fe47bced45554
SHA1
beb8392877a253581d222d578d3b8d9e9f66e23f
SHA256
85fa440859a6698e10d64c12120fc56607f70498a8e89471740c13021d31edfa
SHA512
b3d28a0cff5b0ce56800606965cf61292ba1355b7daf69e67e0d76feea2626083f55fab15708712393baa3775f50b1d98a87dc961b91bb511b663b993227a889
SSDEEP
49152:wVNWVcHQ9DAxEfq7OMjUfkptVx78XuPdy:wm6HQ9DKjUu5/y
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CoGetClassObject
CoCreateInstance
CreateStreamOnHGlobal
CoCreateGuid
IIDFromString
CoInitialize
CoUninitialize
OleRun
OleSetContainedObject
OleLockRunning
OleUninitialize
OleInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
StringFromGUID2
CLSIDFromProgID
CLSIDFromString
SHGetFolderPathW
CommandLineToArgvW
FindExecutableA
SHGetFolderPathA
SHBrowseForFolderA
SHGetFolderLocation
SHGetPathFromIDListA
HttpOpenRequestA
InternetReadFile
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetCrackUrlA
HttpSendRequestA
InternetErrorDlg
HttpQueryInfoA
GetAncestor
PostQuitMessage
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowLongW
GetWindowLongW
AdjustWindowRectEx
EnableMenuItem
GetSystemMenu
ShowWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
DefWindowProcW
GetTopWindow
SetWindowTextW
KillTimer
SetTimer
PostMessageA
MapDialogRect
PtInRect
GetCursorPos
SetCursor
SetWindowContextHelpId
GetWindowRect
SetForegroundWindow
EnableWindow
GetDlgCtrlID
GetWindowThreadProcessId
LoadCursorA
GetWindow
GetClassNameA
GetParent
GetDesktopWindow
SetWindowLongA
GetWindowLongA
DrawTextW
ScreenToClient
GetWindowTextW
MapWindowPoints
EnumWindows
MessageBoxW
SetRect
FillRect
GetSysColor
DialogBoxIndirectParamA
ClientToScreen
MessageBoxA
GetClientRect
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
RedrawWindow
InvalidateRgn
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
DestroyAcceleratorTable
CreateAcceleratorTableA
ReleaseCapture
SetCapture
GetFocus
GetDlgItem
CharNextA
wsprintfA
RegisterWindowMessageA
GetMessageW
DispatchMessageW
PeekMessageA
MsgWaitForMultipleObjectsEx
IsWindowUnicode
SetWindowPos
LoadStringA
EndDialog
SendMessageA
DefWindowProcA
CallWindowProcA
UnregisterClassA
RegisterClassExA
GetClassInfoExA
CreateWindowExA
IsWindow
IsChild
DestroyWindow
GetActiveWindow
SetFocus
MoveWindow
IsValidURL
InitCommonControlsEx
WinVerifyTrust
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringEx
InitializeCriticalSectionEx
GetStringTypeW
GetModuleHandleW
GetSystemTimeAsFileTime
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemInfo
VirtualProtect
VirtualQuery
GetStdHandle
GetFileType
GetModuleFileNameW
WriteConsoleW
GetConsoleOutputCP
GetConsoleMode
CreateThread
ExitThread
FreeLibraryAndExitThread
InitializeSListHead
GetProcessHeap
HeapFree
HeapAlloc
EncodePointer
InitializeCriticalSection
CreateFileW
CreateMutexA
ReleaseMutex
LoadLibraryW
GetModuleHandleExA
OpenFileMappingA
CreateFileMappingA
DeleteFileW
GetDriveTypeW
GetFullPathNameW
CreateDirectoryW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
SetStdHandle
HeapSize
HeapReAlloc
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesW
ReadConsoleW
FlushFileBuffers
GetFileSizeEx
GetCurrentDirectoryW
GetTimeZoneInformation
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
InterlockedPushEntrySList
OutputDebugStringW
IsDebuggerPresent
VirtualFree
VirtualAlloc
InterlockedPopEntrySList
IsProcessorFeaturePresent
FlushInstructionCache
GetCommandLineA
GetCommandLineW
DecodePointer
RaiseException
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentThreadId
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryExA
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalHandle
GlobalFree
MulDiv
lstrcmpA
lstrcmpiA
lstrcpyA
FindResourceA
SetDllDirectoryA
MultiByteToWideChar
WideCharToMultiByte
IsDBCSLeadByte
FindResourceW
LocalFree
CreateFileA
DeleteFileA
ReadFile
CloseHandle
lstrcpynA
lstrlenA
GetTempPathA
lstrcatA
CreateDirectoryA
WriteFile
GetSystemDirectoryA
MoveFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
LocalAlloc
FormatMessageA
Sleep
GetUserDefaultLCID
SetEvent
CreateEventA
FileTimeToSystemTime
SystemTimeToFileTime
GetCurrentProcessId
GetLocalTime
FormatMessageW
FindClose
FindFirstFileA
FindNextFileA
GetDriveTypeA
GetFileAttributesA
RemoveDirectoryA
SetFileAttributesA
GetTickCount
MoveFileExA
UnmapViewOfFile
WaitForSingleObject
ExitProcess
TerminateProcess
OpenProcess
GetWindowsDirectoryA
GetLocaleInfoA
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
QueryPerformanceCounter
QueryPerformanceFrequency
SetEndOfFile
SetFilePointerEx
GetCurrentProcess
GetLogicalProcessorInformation
GetNativeSystemInfo
GetSystemWow64DirectoryA
GetModuleHandleExW
LoadLibraryExW
OpenMutexA
GetSystemTime
OpenThread
GetExitCodeThread
SetHandleInformation
CreatePipe
PeekNamedPipe
GetExitCodeProcess
CreateProcessA
MapViewOfFile
FlushViewOfFile
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegQueryValueExA
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
RegEnumKeyA
OpenProcessToken
CopySid
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorA
ConvertSidToStringSidA
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
VariantInit
VariantClear
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantCopy
VariantChangeType
SysStringByteLen
SysAllocStringByteLen
GetErrorInfo
PathIsDirectoryEmptyA
SHDeleteKeyA
ord12
PathAppendA
DeleteObject
GetDeviceCaps
GetStockObject
DeleteDC
GetObjectA
SetBkMode
SetTextColor
CreateFontIndirectA
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetAdaptersAddresses
CryptBinaryToStringA
CryptProtectData
CryptUnprotectData
CryptStringToBinaryA
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
ord159
ord204
ord44
ord115
ord117
ord91
ord158
ord160
ord8
ord31
ord189
ord87
ord67
ord168
ord137
ord141
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ