Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
b52ea419616297c0453629bc0ef36dfd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b52ea419616297c0453629bc0ef36dfd.exe
Resource
win10v2004-20240226-en
Target
b52ea419616297c0453629bc0ef36dfd
Size
718KB
MD5
b52ea419616297c0453629bc0ef36dfd
SHA1
b4d2ca20baa237c57c1bf83ada71a8a8c2d65cb0
SHA256
224a4f6cd3a9cb24875f6220f13f28a55bae164c5a54032584fe8900bc6637ee
SHA512
305b6d1886dbb62b02f289afb198bc783b79a56287012b6c30c879ed9bbd8ee0f810d4dbef8d0078a10f736541a7f5c2e3550ca77df20069311c01585b6d0def
SSDEEP
6144:KoBC/4V9CeJcskP9PRyMi5K9uRtcgEr3HhxaPiJ+FYuPIiREE7uXMeB3PPX2fvTf:FC/05c05KsfErXTa6cdEUyMImfvTPTt
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
InternetCrackUrlA
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
InternetConnectA
InternetReadFile
InternetSetOptionA
InternetQueryOptionA
InternetCloseHandle
WSAStartup
inet_ntoa
gethostbyname
WSACleanup
GetMailslotInfo
GetModuleFileNameA
FindResourceW
FindResourceExW
GetDiskFreeSpaceA
CreateFileA
DeleteFileA
FindFirstFileA
FindNextFileA
MultiByteToWideChar
WideCharToMultiByte
GetFileSize
GetFileSizeEx
WriteFile
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
GetSystemTimeAsFileTime
ExpandEnvironmentStringsA
CreateDirectoryA
GetFileAttributesA
FreeLibrary
GetProcAddress
OpenProcess
GetCurrentProcess
TerminateProcess
LoadLibraryA
GetVersion
GetModuleHandleA
GetVersionExA
ReleaseMutex
CreateMutexA
OpenMutexA
LocalFree
SetLastError
GetCurrentProcessId
GetCurrentThreadId
GlobalAlloc
GlobalFlags
GlobalLock
GlobalUnlock
GlobalFree
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
WaitForMultipleObjects
lstrcpyA
lstrlenA
CreateEventA
RemoveDirectoryA
FindFirstChangeNotificationA
LocalAlloc
InterlockedIncrement
PeekNamedPipe
RaiseException
MulDiv
lstrcmpA
InitializeCriticalSection
GlobalHandle
lstrcmpiA
LoadLibraryExA
FindResourceA
IsDBCSLeadByte
GetTempPathA
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InterlockedCompareExchange
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
DecodePointer
EncodePointer
GetStringTypeW
RtlUnwind
GetSystemInfo
VirtualProtect
VirtualQuery
AreFileApisANSI
IsDebuggerPresent
ExitThread
LoadLibraryExW
GetCommandLineA
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetTimeZoneInformation
CloseHandle
FindClose
GetFileType
SizeofResource
LoadResource
Sleep
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
GetLastError
OpenThread
CreateThread
LockResource
InterlockedDecrement
GetACP
GetOEMCP
GetConsoleCP
GetConsoleMode
MoveFileExW
QueryPerformanceCounter
GetEnvironmentStringsW
GetStartupInfoW
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
IsValidCodePage
FreeEnvironmentStringsW
OutputDebugStringW
LoadLibraryW
SetFilePointerEx
SetStdHandle
WriteConsoleW
CreateFileW
ReadConsoleW
SetEnvironmentVariableA
FlushInstructionCache
HeapDestroy
SetActiveWindow
SetMenuDefaultItem
SetMenuItemInfoA
GetMenuItemInfoA
EnableWindow
ShowWindow
CreateDialogIndirectParamA
PeekMessageA
DispatchMessageA
TranslateMessage
GetMessageA
RegisterClassA
UnregisterClassA
GetClassInfoA
UpdateLayeredWindow
ValidateRect
MapDialogRect
SetWindowContextHelpId
KillTimer
SetTimer
LoadIconA
EndDialog
GetMonitorInfoA
MonitorFromWindow
IsDialogMessageA
LoadCursorA
GetWindow
GetDesktopWindow
SetWindowLongA
GetWindowLongA
FillRect
GetSysColor
MapWindowPoints
ScreenToClient
ClientToScreen
GetClientRect
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
RedrawWindow
InvalidateRgn
EndPaint
BeginPaint
CreateAcceleratorTableA
ReleaseCapture
SetCapture
GetFocus
IsWindowVisible
SendDlgItemMessageA
SetFocus
CharNextA
GetDlgItem
MoveWindow
DestroyWindow
IsChild
CreateWindowExA
GetClassInfoExA
RegisterClassExA
CallWindowProcA
PostQuitMessage
DefWindowProcA
RegisterWindowMessageA
DestroyIcon
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
FindWindowExA
GetWindowRect
InvalidateRect
ReleaseDC
GetDC
SendMessageA
SystemParametersInfoA
GetWindowThreadProcessId
GetClassNameA
FindWindowA
GetParent
MessageBoxA
AllowSetForegroundWindow
SetForegroundWindow
GetForegroundWindow
keybd_event
GetKeyboardState
BringWindowToTop
SetWindowPos
IsWindow
AttachThreadInput
PostMessageA
SendMessageTimeoutA
DestroyAcceleratorTable
GetTextExtentPoint32A
SelectObject
DeleteObject
BitBlt
CreateCompatibleBitmap
CreateFontA
CreateDIBSection
GetDeviceCaps
DeleteDC
CreateSolidBrush
GetObjectA
CreateCompatibleDC
GetStockObject
GetTokenInformation
RegCloseKey
RegOpenKeyExA
GetSidSubAuthority
RegQueryValueExA
OpenProcessToken
GetSidSubAuthorityCount
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegEnumValueA
LookupPrivilegeValueA
AdjustTokenPrivileges
SHGetFolderPathA
SHFileOperationA
SHCreateDirectoryExA
ShellExecuteExA
CLSIDFromProgID
CreateStreamOnHGlobal
CoUninitialize
CoInitializeEx
CoGetClassObject
CLSIDFromString
StringFromGUID2
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
OleUninitialize
OleLockRunning
CoInitialize
CoTaskMemRealloc
CoCreateInstance
SysStringLen
VariantInit
VariantClear
VariantChangeType
LoadTypeLi
SysFreeString
OleCreateFontIndirect
DispCallFunc
VarUI4FromStr
VariantCopy
SysAllocStringLen
LoadRegTypeLi
SysAllocString
UrlEscapeA
ImageList_Remove
ImageList_ReplaceIcon
ImageList_GetImageCount
InitCommonControlsEx
GdipDrawPath
GdipSetInterpolationMode
GdipDeleteGraphics
GdipCloneBitmapAreaI
GdipCreateHICONFromBitmap
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdipDeletePen
GdipCreatePen1
GdipGraphicsClear
GdipGetPathGradientPointCount
GdipSetPathGradientSurroundColorsWithCount
GdipSetPathGradientCenterColor
GdipCreatePathGradientFromPath
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipWindingModeOutline
GdipAddPathEllipseI
GdipAddPathRectangleI
GdipDeletePath
GdipCreatePath
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
GdipFillPath
GdipDrawLineI
GdipSetSmoothingMode
GdipReleaseDC
GdipCreateFromHDC
GdipLoadImageFromStream
GdipSetPenMode
GdipSetStringFormatTrimming
GdipSetStringFormatAlign
GdipDeleteStringFormat
GdipCreateStringFormat
GdipMeasureString
GdipDrawString
GdipDeleteFont
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipSetPathGradientFocusScales
GdipDrawImageRectI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ