Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
a3c0ba6644ac042514037a92836aec2f8fc7d662cce71a70537087481431a58a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3c0ba6644ac042514037a92836aec2f8fc7d662cce71a70537087481431a58a.exe
Resource
win10v2004-20220901-en
Target
a3c0ba6644ac042514037a92836aec2f8fc7d662cce71a70537087481431a58a
Size
297KB
MD5
a251afa10ebd68b6190370d189e74f10
SHA1
1c1379fb02faea957a6937edbd4fdce220c9484f
SHA256
a3c0ba6644ac042514037a92836aec2f8fc7d662cce71a70537087481431a58a
SHA512
f68c84b7925ba7c3729bf6d0cf919ac6c27dca8380353254f6bded139677d74f6c942d642f6149a89fdfe6733b9591db2d23e66487dfadd2ad7b888e817b13e0
SSDEEP
6144:SElZOS/3I9UygSo6D5Ds9zGr6TATAYjk1GmtP61:Srr+yPySjAYjmtP61
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
lstrcatA
GetWindowsDirectoryA
ExitProcess
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileSize
GetFileType
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetStdHandle
GetStartupInfoA
GetTickCount
GetVersionExA
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InterlockedExchange
LoadLibraryA
QueryPerformanceCounter
RtlUnwind
SetEndOfFile
SetFilePointer
SetHandleCount
TerminateProcess
UnhandledExceptionFilter
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteFile
lstrlenA
GetStartupInfoW
VirtualAlloc
GetSystemTimeAsFileTime
Sleep
DestroyWindow
DialogBoxParamA
DispatchMessageA
EndDialog
GetDesktopWindow
GetDlgItem
GetParent
GetWindowRect
IsDialogMessageA
IsDlgButtonChecked
LoadStringA
MessageBoxA
OffsetRect
PeekMessageA
SendMessageA
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetWindowPos
ShowWindow
SystemParametersInfoA
TranslateMessage
CheckDlgButton
CharPrevA
LoadIconA
CreateDialogParamA
GetStockObject
RegOpenKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ