Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
77814a579ea81b1a36ecaa994e123792.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
77814a579ea81b1a36ecaa994e123792.exe
Resource
win10v2004-20231215-en
Target
77814a579ea81b1a36ecaa994e123792
Size
390KB
MD5
77814a579ea81b1a36ecaa994e123792
SHA1
715cc9f30ae41976fc3d83562ee82b3ca9d34264
SHA256
2054c49212ea2764172366dfca2e698ef593d6a062e5add9418337e23a68dfb7
SHA512
3afef87d5f02a452e2ec4f8b9262db68b5e278e0a44b5024c57bf826bb4c51b7524780e1764f77c36c9afa4c1a4462cbbc745ebc59dff3be294b6bd2ddff4916
SSDEEP
12288:1sHYGpEaGUcWtx/kdnzLIFaGpJfz6Q9wI:1sHYME9Wtx/UnjGpJfB9wI
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryExA
CopyFileA
GetSystemTime
LocalAlloc
LocalFree
lstrlenW
MulDiv
GetFullPathNameA
GetFileAttributesA
DosDateTimeToFileTime
LocalFileTimeToFileTime
IsDBCSLeadByte
LeaveCriticalSection
RaiseException
EnterCriticalSection
SizeofResource
LoadResource
FindResourceA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedIncrement
GetCurrentThreadId
FlushInstructionCache
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpA
CreateMutexA
CreateEventA
CreateFileW
SetEndOfFile
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointer
GetConsoleMode
GetConsoleCP
ReadFile
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
Sleep
InterlockedDecrement
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
HeapReAlloc
HeapSize
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapCreate
GetStdHandle
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualProtect
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetEnvironmentStringsW
WriteFile
SetFileTime
GetFileTime
CreateDirectoryA
FreeLibrary
OutputDebugStringA
GetModuleFileNameW
LoadLibraryW
LoadLibraryA
GetFileAttributesW
GetModuleHandleW
GetModuleFileNameA
GetWindowsDirectoryA
GetTempFileNameA
GetTempPathA
FindNextFileA
DeleteFileA
FindClose
FindFirstFileA
GetFileSize
GetSystemDirectoryA
DeviceIoControl
lstrlenA
lstrcmpiA
TerminateProcess
SetLastError
WaitForSingleObject
CreateRemoteThread
GetExitCodeProcess
DuplicateHandle
Process32Next
GetCurrentProcessId
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetLastError
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetVersion
GetVersionExA
GetPrivateProfileStringA
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
CreateFileA
FreeEnvironmentStringsW
GetWindow
GetWindowRect
GetClientRect
GetParent
SetWindowPos
UnregisterClassA
GetDesktopWindow
GetWindowLongA
wsprintfA
ScreenToClient
CreateAcceleratorTableA
DestroyWindow
GetClassInfoExA
RedrawWindow
IsWindow
GetDlgItem
IsChild
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
PeekMessageA
TranslateMessage
DispatchMessageA
SetFocus
SetForegroundWindow
ShowWindow
FindWindowA
GetWindowThreadProcessId
GetClassNameA
MessageBoxA
GetSystemMetrics
GetFocus
RegisterWindowMessageA
MoveWindow
InvalidateRgn
CallWindowProcA
GetDC
ReleaseDC
DestroyAcceleratorTable
RegisterClassExA
CharNextA
SetRect
FillRect
GetSysColor
DefWindowProcA
SetCursor
KillTimer
GetCursorPos
ReleaseCapture
SetTimer
GetCapture
GetForegroundWindow
SetCapture
EndPaint
BeginPaint
InvalidateRect
SetWindowLongA
RegisterClassA
LoadCursorA
SendMessageA
CreateWindowExA
LoadBitmapA
PtInRect
ClientToScreen
LoadStringW
CreateCompatibleDC
SelectObject
GetObjectA
BitBlt
DeleteDC
DeleteObject
CreatePen
CreateCompatibleBitmap
CreateSolidBrush
LineTo
GetStockObject
GetDeviceCaps
RoundRect
MoveToEx
GetUserNameA
RegSetValueExA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
DeleteService
ControlService
CreateServiceA
OpenServiceA
OpenSCManagerA
RegQueryInfoKeyW
RegEnumValueA
QueryServiceConfig2A
QueryServiceConfigA
EnumServicesStatusExA
GetUserNameW
ChangeServiceConfigA
QueryServiceStatus
ChangeServiceConfig2A
CloseServiceHandle
ShellExecuteExA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
CreateStreamOnHGlobal
CLSIDFromString
CoTaskMemFree
CoGetClassObject
CLSIDFromProgID
OleLockRunning
StringFromGUID2
CoTaskMemAlloc
CoTaskMemRealloc
CoFreeUnusedLibraries
CoInitializeEx
CoCreateGuid
OleUninitialize
OleInitialize
CoUninitialize
CoCreateInstance
CoInitialize
SysAllocStringLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VarUI4FromStr
VariantChangeType
SysStringLen
SysAllocString
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
VariantInit
VariantClear
SysFreeString
SysAllocStringByteLen
SysStringByteLen
InternetQueryDataAvailable
InternetOpenUrlA
DeleteUrlCacheEntry
InternetReadFile
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
URLDownloadToFileA
GetModuleFileNameExA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ