Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8e3578e9a1dc73c5aa6f68c0a22492a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e3578e9a1dc73c5aa6f68c0a22492a8.exe
Resource
win10v2004-20231215-en
Target
8e3578e9a1dc73c5aa6f68c0a22492a8
Size
588KB
MD5
8e3578e9a1dc73c5aa6f68c0a22492a8
SHA1
16fb78eba22f5a1f9cfd07267d0325d3c84d768c
SHA256
7863e938e902438cf7d3f5812e0c32933093874fe32de454ee1b0bb259e0f4a9
SHA512
db10f40805c3f8b569cdd637ff4e2ee5c9c9efd387f8dab6a1b7458361ce49561d9560c4b209d3d380857a28da59aebb56ac3d9bffd783dca9e7be5e828e95b2
SSDEEP
12288:hi5sXkbjglnHnAmdoWNvIYLKBalhb6XDtpR/5zhmW:zXxHnAmdoIArBa36ztP/1J
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
CreateFileW
WriteFile
FlushFileBuffers
ResetEvent
GetVersionExW
GetTempPathW
CreateDirectoryW
GetFileSize
RemoveDirectoryW
GetCurrentProcessId
SystemTimeToFileTime
LocalFileTimeToFileTime
ResumeThread
WideCharToMultiByte
GetFileInformationByHandle
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
lstrcmpW
GlobalUnlock
GlobalLock
GlobalAlloc
CloseHandle
ReadFile
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
GetConsoleCP
DeleteCriticalSection
RtlUnwind
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
lstrlenW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
SetFilePointer
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetWindowLongW
DefWindowProcW
CreateWindowExW
CallWindowProcW
LoadCursorW
GetClassInfoExW
RegisterClassExW
SetTimer
CharNextW
DestroyWindow
DispatchMessageW
KillTimer
SetWindowLongW
RedrawWindow
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
UnregisterClassA
CreateAcceleratorTableW
InvalidateRect
GetDesktopWindow
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
SendMessageW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
LoadIconW
FindWindowW
IsWindow
PeekMessageW
GetMessageW
TranslateMessage
CreateSolidBrush
GetStockObject
GetDeviceCaps
GetObjectW
CreateCompatibleDC
DeleteDC
DeleteObject
SelectObject
GetSaveFileNameW
GetOpenFileNameW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
Shell_NotifyIconW
CommandLineToArgvW
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CoGetInterfaceAndReleaseStream
CLSIDFromProgID
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
SysAllocString
VariantClear
VariantInit
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringLen
VariantCopy
SysFreeString
VariantChangeType
PathAddBackslashW
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ