Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
a5585e3c11ced09428da9833c1a6831bfa8544fa83b5fabdda79c93039728833.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a5585e3c11ced09428da9833c1a6831bfa8544fa83b5fabdda79c93039728833.exe
Resource
win10v2004-20240426-en
Target
a5585e3c11ced09428da9833c1a6831bfa8544fa83b5fabdda79c93039728833
Size
6.0MB
MD5
b89ffbb64f760c2ba2d5498ae58cbf3b
SHA1
8c720d0a1257720ae6d497de17f15b88520a08a1
SHA256
a5585e3c11ced09428da9833c1a6831bfa8544fa83b5fabdda79c93039728833
SHA512
184e2fad25ddfc034c87cceecd2f21565d3d1ffc23518bd65cb475714d0bfa6f3ccee447e1bb3a5a9d8220eaca040a03104bb39da62961699a1a5e8553c1cdb5
SSDEEP
98304:X2o9SymMmxu5fZIdtLiZT7y1jsL6EZXp8IOddaRuc5Gh5vH3CYht5fDC3jKAs7gJ:Xz9SymoKz1jeNtUcUf/yiDC3jxsORwY
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
upgraderstub.pdb
RegCreateKeyExW
RegDeleteKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegSetValueExW
GetSecurityDescriptorDacl
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorSacl
GetSecurityDescriptorControl
GetSecurityDescriptorLength
GetAclInformation
OpenEncryptedFileRawW
WriteEncryptedFileRaw
CloseEncryptedFileRaw
ImpersonateSelf
RevertToSelf
GetSystemInfo
SetThreadIdealProcessor
GetCurrentThread
GetVolumeInformationW
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
LockFileEx
UnlockFileEx
GetOverlappedResult
MapViewOfFile
UnmapViewOfFile
CreateSemaphoreW
ReleaseSemaphore
WaitForMultipleObjects
InterlockedExchangeAdd
CreateThread
LocalFree
DeleteFileW
CloseHandle
ReleaseMutex
InterlockedIncrement
GetHandleInformation
CreateEventW
CreateFileMappingW
LocalAlloc
FileTimeToSystemTime
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
GetModuleHandleExW
OpenMutexW
OpenProcess
LocalFileTimeToFileTime
SetFileTime
DosDateTimeToFileTime
DuplicateHandle
GetShortPathNameW
SetEndOfFile
HeapSize
HeapReAlloc
ReadFile
GetFileSizeEx
SetFilePointerEx
GlobalFree
GlobalAlloc
RemoveDirectoryW
WideCharToMultiByte
DeleteCriticalSection
GetUserDefaultUILanguage
GetExitCodeThread
EnterCriticalSection
GetProcAddress
GetLastError
VerifyVersionInfoW
GetTempPathW
WritePrivateProfileStringW
CompareStringW
GetFileAttributesW
LeaveCriticalSection
InitializeCriticalSection
GetModuleHandleW
WaitForSingleObject
CreateDirectoryW
GetSystemWindowsDirectoryW
VerSetConditionMask
CreateMutexW
GetTempFileNameW
GetEnvironmentVariableW
GetCommandLineW
GetFullPathNameW
GetProcessHeap
HeapFree
HeapAlloc
Sleep
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
OutputDebugStringA
GetModuleHandleA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
FindFirstFileW
SetLastError
FindClose
FindNextFileW
CopyFileExW
CreateFileW
DeviceIoControl
GetFileInformationByHandle
SetFileAttributesW
GetDriveTypeW
GetModuleFileNameW
FreeLibrary
SetEvent
LoadLibraryW
FormatMessageW
CreateFileA
SetFilePointer
WriteFile
LoadStringW
MessageBoxW
SendMessageW
free
_fileno
isleadbyte
mbtowc
__mb_cur_max
_iob
_snprintf
_itoa
malloc
wcsrchr
_wcsicmp
_wcsnicmp
_vscwprintf
towupper
_purecall
memcmp
qsort
wcsncmp
wcschr
_vsnwprintf
ferror
__badioinfo
__pioinfo
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
??0exception@@QAE@ABV0@@Z
iswdigit
_vsnprintf
_isatty
_write
_lseeki64
_controlfp
?terminate@@YAXXZ
memmove
memset
memcpy
??1type_info@@UAE@XZ
_onexit
__dllonexit
_unlock
_lock
_acmdln
_initterm
__setusermatherr
_ismbblead
__p__fmode
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
_XcptFilter
_CxxThrowException
??0exception@@QAE@XZ
__CxxFrameHandler
_errno
iswspace
CoCreateInstance
CoUninitialize
CoInitialize
RpcStringFreeW
UuidCreate
ShellExecuteExW
SHGetFolderPathW
CommandLineToArgvW
SHChangeNotify
RtlAllocateHeap
RtlFreeHeap
RtlDosPathNameToNtPathName_U
RtlNtStatusToDosError
NtSetInformationFile
RtlReAllocateHeap
RtlDeleteCriticalSection
RtlUnwind
RtlSetControlSecurityDescriptor
NtSetSecurityObject
RtlAdjustPrivilege
RtlInitializeResource
RtlAcquireResourceExclusive
RtlAcquireResourceShared
RtlReleaseResource
RtlDeleteResource
RtlLeaveCriticalSection
RtlInitializeCriticalSection
RtlRaiseStatus
RtlEnterCriticalSection
NtYieldExecution
PathFindFileNameW
PathFileExistsW
StrStrIW
ord22
ord20
ord23
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
EnumProcesses
GetModuleFileNameExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ