Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
a79f5a6623b70ab21f2b7dc9fd7710fd0f460205baf878e37e1ca12bf2beaa2a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a79f5a6623b70ab21f2b7dc9fd7710fd0f460205baf878e37e1ca12bf2beaa2a.exe
Resource
win10v2004-20220812-en
Target
a79f5a6623b70ab21f2b7dc9fd7710fd0f460205baf878e37e1ca12bf2beaa2a
Size
29KB
MD5
93e3b300b98d8da0cdaade5de0d97a90
SHA1
3cf2a200cabc40d84bae49041c19953e6c9965ad
SHA256
a79f5a6623b70ab21f2b7dc9fd7710fd0f460205baf878e37e1ca12bf2beaa2a
SHA512
d2c70c69af1d783b0dd44963128563df5a3e525292ca8e3b6631080898b5a5ab3e974697cc41ef1138e99061c65cc2f1ee7ef9bb0b61a6576e175046f14a6f36
SSDEEP
384:0fH9cwZ8MbCoWlhdAHzqv2OTOc4SlJlxHC7I4/SVohRJssIrJul:2H9KMbpswS2Lc4+9CMChRysIrJo
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetModuleFileNameA
GetProcAddress
GetProcessHeap
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
IsDBCSLeadByte
LoadLibraryExA
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
FileTimeToDosDateTime
OpenProcess
QueryPerformanceCounter
ReadFile
SetCommTimeouts
SetCurrentDirectoryA
SetErrorMode
GetCurrentProcess
SetFilePointer
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForMultipleObjects
WideCharToMultiByte
lstrcpynA
lstrlenW
ExpandEnvironmentStringsA
ExitThread
ExitProcess
EnterCriticalSection
DeviceIoControl
DeleteFileA
DebugBreak
CreateThread
CreateFileMappingA
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
lstrcatA
CreateFileA
FreeLibrary
FormatMessageA
SetFileAttributesA
FileTimeToLocalFileTime
VirtualAllocEx
GlobalLock
OpenFileMappingA
GlobalUnlock
SetClipboardViewer
SendMessageA
InvalidateRect
BeginPaint
GetClientRect
OpenClipboard
GetClipboardData
DrawTextA
CloseClipboard
EndPaint
ChangeClipboardChain
PostQuitMessage
DefWindowProcA
CreateFontIndirectA
AddFontResourceA
GetDeviceCaps
AdjustTokenPrivileges
RegOpenKeyExW
EqualSid
FreeSid
GetTokenInformation
LookupAccountSidA
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegEnumKeyA
RegEnumKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegSetValueExA
AllocateAndInitializeSid
memcpy
_XcptFilter
__getmainargs
__lconv_init
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_ftol
_initterm
_mbschr
_mbsinc
_mbslen
_mbsrchr
_stricmp
_strnicmp
_wcsicmp
atoi
exit
free
isleadbyte
isspace
memmove
setlocale
strchr
strncmp
strncpy
strrchr
strtoul
towlower
wcsncpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ