Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
4b47440a352e71cce53042e0e8fd3046.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b47440a352e71cce53042e0e8fd3046.exe
Resource
win10v2004-20231215-en
Target
4b47440a352e71cce53042e0e8fd3046
Size
1.4MB
MD5
4b47440a352e71cce53042e0e8fd3046
SHA1
4a546ce5252619b06ef6d47d75641682a08bbd9e
SHA256
1505a977cf390c3f0b711f6cffd6c4a6ab053639de8bb13c029fd7175d38cb03
SHA512
47f1d85d4b2a6a4a68b2933b9c945bea5193e87ecab36321c5f4ce99b7b358541ad3cc5ca556173f828017b486aea8715336391910d9e5bd1e8ff4450bfb8fc3
SSDEEP
24576:AunPlFgaE4oL/wxrQM3kF75mxo37HyZwTtMlbmEY85NooKUB2pSOYsTS:PPpZE4Qr75aYSqt1EY8goKUB2pSOYsTS
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
InternetConnectW
InternetReadFile
InternetSetOptionW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
GetProcessHeap
GetCurrentProcessId
SetLastError
GetModuleHandleA
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
LoadLibraryW
GetFileSize
GetFileSizeEx
WriteFile
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
FindClose
GetFileTime
SetFileTime
GetSystemTimeAsFileTime
CreateDirectoryW
GetFileAttributesW
FindFirstFileW
GetTimeZoneInformation
LocalFree
GetCurrentProcess
FreeLibrary
TerminateProcess
WaitForSingleObject
LoadLibraryA
GetVersion
LockFile
UnlockFile
LockFileEx
GetSystemTime
TlsAlloc
TlsGetValue
TlsSetValue
GetTempPathA
GetFullPathNameA
GetFullPathNameW
CreateFileA
GetFileAttributesA
DeleteFileA
DeleteFileW
AreFileApisANSI
InterlockedIncrement
InterlockedDecrement
GlobalAlloc
GlobalLock
GlobalUnlock
FlushInstructionCache
RaiseException
GetCurrentThreadId
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CloseHandle
lstrcmpW
CreateMutexW
OpenMutexW
FormatMessageW
FileTimeToSystemTime
HeapFree
GlobalHandle
GlobalFree
lstrcmpiW
LoadLibraryExW
GetStdHandle
QueryPerformanceCounter
GlobalMemoryStatus
GetVersionExA
FlushConsoleInputBuffer
GetConsoleMode
SetConsoleCtrlHandler
GetCommandLineW
ExitThread
CreateThread
GetModuleHandleExW
ExitProcess
IsDebuggerPresent
GetCPInfo
RtlUnwind
EncodePointer
GetStringTypeW
DecodePointer
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
InterlockedCompareExchange
HeapSize
HeapReAlloc
TlsFree
HeapDestroy
HeapAlloc
GetDiskFreeSpaceW
GetStartupInfoW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetConsoleCP
SetFilePointerEx
GetFileType
SizeofResource
LoadResource
Sleep
GetLastError
OpenThread
OpenProcess
LockResource
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReadConsoleW
SetStdHandle
OutputDebugStringW
WriteConsoleW
SetEnvironmentVariableA
ReadConsoleInputA
SetConsoleMode
UnhandledExceptionFilter
GetTickCount
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
FindNextFileW
CreateFileW
GetTempPathW
FindResourceExW
FindResourceW
GetModuleHandleW
GetModuleFileNameW
GetMailslotInfo
DosDateTimeToFileTime
PeekNamedPipe
SetUnhandledExceptionFilter
MulDiv
SetWindowLongW
GetWindowLongW
FillRect
GetSysColor
GetDesktopWindow
ClientToScreen
SetWindowContextHelpId
GetClientRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
RedrawWindow
ScreenToClient
InvalidateRect
EndPaint
GetWindow
LoadCursorW
MapDialogRect
LoadStringW
DialogBoxIndirectParamW
GetActiveWindow
BeginPaint
ReleaseDC
GetParent
InvalidateRgn
GetClassNameW
GetDC
CreateAcceleratorTableW
SetTimer
ReleaseCapture
SetCapture
GetFocus
SetFocus
CharNextW
SendDlgItemMessageW
GetDlgItem
EndDialog
SetWindowPos
MoveWindow
DestroyWindow
IsChild
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
SendMessageW
RegisterWindowMessageW
GetWindowThreadProcessId
EnumWindows
PostMessageW
UnregisterClassW
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxA
DestroyAcceleratorTable
GetObjectW
SelectObject
GetStockObject
GetDeviceCaps
DeleteDC
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteObject
RegDeleteKeyW
RegCloseKey
RegEnumKeyExW
RegEnumValueW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
OpenProcessToken
GetTokenInformation
LookupAccountSidW
RegSetValueW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteValueW
RegQueryInfoKeyW
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegCreateKeyExW
SHFileOperationW
SHGetFolderPathW
ShellExecuteExW
CoTaskMemFree
CoGetClassObject
CoUninitialize
CoInitialize
CLSIDFromString
CLSIDFromProgID
StringFromGUID2
CoTaskMemAlloc
OleInitialize
OleUninitialize
CreateStreamOnHGlobal
OleLockRunning
CoTaskMemRealloc
CoCreateInstance
VariantClear
VarUI4FromStr
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
VariantInit
SysStringLen
SysFreeString
SysAllocStringLen
SysAllocString
InitCommonControlsEx
EnumProcesses
GetProcessImageFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ