Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
bd59bcb9857269f314331abb8755110bb8048dac1e221e1b287c1b6ab1f22ace.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd59bcb9857269f314331abb8755110bb8048dac1e221e1b287c1b6ab1f22ace.exe
Resource
win10v2004-20220812-en
Target
bd59bcb9857269f314331abb8755110bb8048dac1e221e1b287c1b6ab1f22ace
Size
254KB
MD5
1ffa29c9fe2b54a6a0f38f8e30efe332
SHA1
740cd3ae3df2824cc4b2c31faeef1e641a019482
SHA256
bd59bcb9857269f314331abb8755110bb8048dac1e221e1b287c1b6ab1f22ace
SHA512
2be660afc3b0d436c5323c8757cae62ef7c26ce308e15f42f886e581d840477be0eb8374e0bd3b159cd15ed095526cbddd75e0d8c5264170721bbc6e185b7f43
SSDEEP
6144:m3w/kZdicJEAf1SKFrOH7tQbsS1uQmZJJiSsTQCLs:s7TObtqskuXziW2s
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
InitializeCriticalSection
InterlockedDecrement
FlushInstructionCache
IsBadStringPtrA
IsBadStringPtrW
IsBadWritePtr
LeaveCriticalSection
LoadLibraryW
LocalFree
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
lstrcmpiW
lstrcpyW
lstrlenA
lstrlenW
DeleteCriticalSection
EnterCriticalSection
CreateMutexW
CloseHandle
GetCommandLineW
LoadLibraryA
GetProcAddress
GetSystemDirectoryA
lstrcatA
CreateFileA
InterlockedIncrement
VirtualAllocEx
GetStockObject
RegQueryValueExW
RegOpenKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
free
malloc
realloc
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE