Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
72fd2527f57af65682e2c571c82bb6cee21b45ebf2e7542b664cf4137fb20aab.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72fd2527f57af65682e2c571c82bb6cee21b45ebf2e7542b664cf4137fb20aab.exe
Resource
win10v2004-20231215-en
Target
72fd2527f57af65682e2c571c82bb6cee21b45ebf2e7542b664cf4137fb20aab.exe.zip
Size
14.3MB
MD5
7af63fcc1ffe5347ecf4846aaebbc319
SHA1
492b5b747d89da5cc78c4660df10c5a504afce40
SHA256
d0d1e1fd1e2f6ec599a449412e186219859520c1b16d9c6a80d6bc3c70df8dc7
SHA512
3bb4f0804923338654ab7797b74696201afe9f04be6cecc3a6142989c0cbc1041f7ecdbe88a1ef97ade8e4fd548ce4f8e0eec1e59f4a54b1ca3fc5f803f8e857
SSDEEP
196608:T4BMiU/gybLGxDlgfuDmGzbC59Rd6BeQHl+GdQb/+3hWquMQvZt8k5G5DVQBRMqb:ybjByuDZzaieJGdQLvq8ZteiRRd0OMU
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
UnMapAndLoad
MapAndLoad
PathFileExistsW
PathRemoveFileSpecW
PathAddBackslashW
PathFindFileNameW
PathRenameExtensionW
PathGetArgsW
PathCanonicalizeW
HttpQueryInfoW
HttpSendRequestW
HttpOpenRequestW
InternetSetFilePointer
InternetSetOptionW
InternetOpenW
InternetCrackUrlW
InternetCloseHandle
InternetConnectW
InternetReadFile
VirtualAlloc
GetVersionExW
GetModuleHandleA
GetThreadTimes
GetProcAddress
VerSetConditionMask
GetModuleHandleW
VerifyVersionInfoW
MulDiv
CreateFileW
GetFileSize
SetEndOfFile
CloseHandle
DeleteFileW
GetTickCount
GetTempPathW
SetFilePointer
ReadFile
WriteFile
GetSystemInfo
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
Sleep
EnumResourceNamesW
GetTickCount64
GetCurrentThreadId
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
ExpandEnvironmentStringsW
GetModuleFileNameW
WaitForSingleObject
GetExitCodeProcess
GetCurrentProcess
FormatMessageW
LocalFree
GetLastError
GetLocaleInfoW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
VirtualProtect
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
SetEvent
CreateTimerQueue
WriteConsoleW
HeapSize
ReadConsoleW
SetStdHandle
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
HeapReAlloc
FreeLibraryAndExitThread
ExitThread
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
GetCPInfo
RtlUnwind
InterlockedPushEntrySList
RaiseException
InterlockedFlushSList
FreeLibrary
LoadLibraryExW
ExitProcess
DeleteTimerQueueTimer
LCMapStringW
CompareStringW
DecodePointer
EncodePointer
TlsFree
CreateThread
HeapFree
HeapAlloc
GetACP
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
GetStringTypeW
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
GetExitCodeThread
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
GetModuleHandleExW
GetWindowThreadProcessId
GetForegroundWindow
MessageBoxW
FlashWindowEx
GetSystemMenu
EnableMenuItem
EnableWindow
UnhookWindowsHookEx
TranslateMessage
DispatchMessageW
GetMessageW
CreateDialogParamW
SetWindowsHookExW
DestroyWindow
PostQuitMessage
ShowWindow
SetDlgItemTextW
SetWindowTextW
SetWindowLongW
AttachThreadInput
FillRect
BeginPaint
GetSysColorBrush
GetSysColor
GetDlgItem
CallNextHookEx
LoadIconW
RegisterWindowMessageW
GetWindowLongW
DeferWindowPos
BringWindowToTop
GetDC
SetWindowPos
GetPropW
MonitorFromWindow
EnumChildWindows
SendMessageW
GetSystemMetrics
BeginDeferWindowPos
MapWindowPoints
SetPropW
EndDeferWindowPos
GetClientRect
UpdateWindow
InvalidateRect
GetAncestor
ReleaseDC
EndPaint
GetWindowRect
CreatePen
LineTo
MoveToEx
SelectObject
SetBkColor
SetTextColor
GetStockObject
GetDeviceCaps
GetObjectW
DeleteObject
CreateFontIndirectW
RegGetValueW
RegOpenKeyExW
GetTokenInformation
OpenProcessToken
RegCloseKey
ShellExecuteExW
SHParseDisplayName
CommandLineToArgvW
SHOpenFolderAndSelectItems
SHCreateDirectoryExW
OleRun
CoCreateInstance
CoTaskMemFree
CoInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ