Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
122d60b95c3c1bc31e7c35d8fbae88e8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
122d60b95c3c1bc31e7c35d8fbae88e8.exe
Resource
win10v2004-20231215-en
Target
122d60b95c3c1bc31e7c35d8fbae88e8
Size
614KB
MD5
122d60b95c3c1bc31e7c35d8fbae88e8
SHA1
0967cf22badc8a875a16471fdaf43ab9f31f904a
SHA256
60dafe2edb6a1c9b80720ef333d596d082c5a9908d62d105283a7b7c6dc365f7
SHA512
33a217514f179e900661fa27e539576bce01f1827255c748fa7653af698fb128bab622d8e42d3e76774fb172d3b86adedafc1667f72fcb96fd6e51aba780299a
SSDEEP
6144:pobRo8OoJhBj+5RQDfim1u/FyQTeHjZnDJXScAVxKzotfejLmWTfgnmNNvtFELtT:p8Zj+yfpUy0e2lxYxGWTonmNNDER9sY
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExpandEnvironmentStringsForUserA
EnumProcesses
GetModuleFileNameExA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
InternetCrackUrlA
InternetCombineUrlA
InternetGetCookieA
InternetSetCookieA
InternetCloseHandle
InternetOpenA
InternetSetStatusCallback
InternetSetOptionA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
HttpQueryInfoA
InternetErrorDlg
InternetReadFileExA
lstrcmpW
CompareStringA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcmpA
InterlockedExchange
GetLocaleInfoA
ConvertDefaultLocale
GetCurrentThread
SetThreadPriority
SuspendThread
GetModuleFileNameW
InterlockedDecrement
GetModuleHandleW
InterlockedIncrement
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
FreeResource
SetEndOfFile
SetErrorMode
GetCommandLineA
GetStartupInfoA
GetTimeFormatA
GetDateFormatA
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
ExitProcess
ExitThread
CreateThread
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
WaitForMultipleObjects
GetTimeZoneInformation
FileTimeToSystemTime
SystemTimeToFileTime
SetFilePointer
WriteFile
ReadFile
GetFileSize
CreateFileA
ResumeThread
GetLongPathNameA
GetModuleFileNameA
MoveFileA
GetFileAttributesA
CopyFileA
RemoveDirectoryA
DeleteFileA
GetSystemTime
CreateDirectoryA
FindClose
FindNextFileA
FindFirstFileA
GetCurrentProcessId
Module32Next
Module32First
TerminateProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateProcessA
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventA
ExpandEnvironmentStringsA
GetSystemDirectoryA
GetWindowsDirectoryA
GetSystemInfo
GetVersionExA
GetTempPathA
CloseHandle
GetProcAddress
GetExitCodeProcess
OpenProcess
WaitForSingleObject
GetCurrentProcess
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetCurrentThreadId
GetLocalTime
GetUserDefaultUILanguage
FindResourceExA
LoadLibraryExA
FreeLibrary
EnumResourceLanguagesA
EnumResourceNamesA
LoadLibraryA
EndUpdateResourceA
HeapFree
UpdateResourceA
GetProcessHeap
HeapAlloc
BeginUpdateResourceA
LocalFree
lstrlenA
LocalAlloc
GetModuleHandleA
FormatMessageA
SetFileAttributesA
GetTickCount
CreateMutexA
ReleaseMutex
Sleep
GetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
FlushFileBuffers
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
ShowWindow
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
DestroyMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
CallWindowProcA
GetMenu
SetWindowPos
IsIconic
GetWindowPlacement
GetWindow
ReleaseDC
GetDC
GetClientRect
CopyRect
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetNextDlgTabItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDlgItem
SetWindowTextA
SetWindowLongA
EndDialog
GetSysColorBrush
GetSysColor
GetDlgCtrlID
GetWindowLongA
DialogBoxParamA
GetWindowRect
GetDesktopWindow
FindWindowA
EnumChildWindows
GetClassNameA
FindWindowExA
SetForegroundWindow
IsWindowEnabled
UnregisterClassA
EnumWindows
SystemParametersInfoA
GetSystemMetrics
GetWindowThreadProcessId
GetShellWindow
LoadStringA
LoadIconA
SetTimer
PostMessageA
MessageBoxA
WaitForInputIdle
MessageBoxExA
RedrawWindow
KillTimer
IsWindowVisible
UpdateWindow
EnableWindow
SendMessageA
IsWindow
DefWindowProcA
DeleteDC
GetStockObject
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetTextColor
GetClipBox
GetDeviceCaps
SetBkColor
TextOutA
RectVisible
PtVisible
DeleteObject
SetViewportExtEx
OpenPrinterA
DocumentPropertiesA
ClosePrinter
RegCloseKey
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RevertToSelf
RegOpenUserClassesRoot
RegOpenCurrentUser
AdjustTokenPrivileges
GetLengthSid
ImpersonateLoggedOnUser
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
CreateProcessAsUserA
ShellExecuteExA
SHGetSpecialFolderPathA
InitCommonControlsEx
PathCombineA
PathFindExtensionA
PathStripPathA
PathRemoveFileSpecA
SHDeleteEmptyKeyA
UrlEscapeA
PathFindFileNameA
PathRenameExtensionA
CoCreateInstance
CoCreateGuid
StringFromGUID2
OleUninitialize
OleInitialize
CoTaskMemAlloc
SafeArrayAccessData
SafeArrayUnaccessData
VariantInit
VariantChangeType
VariantClear
SafeArrayDestroy
SysAllocStringLen
SysFreeString
SysAllocString
SafeArrayCreateVector
CreateStdAccessibleObject
LresultFromObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ