Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
057a78f1c932c2ddbf933f955b983906a9350406b11501adb2fc7aaf578f39c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
057a78f1c932c2ddbf933f955b983906a9350406b11501adb2fc7aaf578f39c7.exe
Resource
win10v2004-20220812-en
Target
057a78f1c932c2ddbf933f955b983906a9350406b11501adb2fc7aaf578f39c7
Size
191KB
MD5
08694479abdcd1a1c28dd5f29ad99080
SHA1
39fff440239ecde03c34a2fad8fc677411c7971e
SHA256
057a78f1c932c2ddbf933f955b983906a9350406b11501adb2fc7aaf578f39c7
SHA512
31ec19c80d54cd1567f4b8f7899eb2a1f08475a804679d97723231d164211bbbd6a3ab732113f4671d90c49d152001f6ba3e77f5114420cac5dd095f13af3414
SSDEEP
1536:s0FSiB1F2K37Nfy1MlJqJ+Oj2TovVNE4dh4YMrCB2J0Wy2sFBisKldl:5F1zF20VlXOj2kvVDYcB2J0WTsoJ
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
?VSMessageBoxSimple@@YGHPAUHWND__@@PB_W1I@Z
_controlfp_s
_invoke_watson
?terminate@@YAXXZ
_crt_debugger_hook
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
??3@YAXPAX@Z
_cexit
__getmainargs
_amsg_exit
_wtoi
??_V@YAXPAX@Z
wcsstr
wcsncpy_s
_vsnwprintf
iswspace
__CxxFrameHandler3
memset
wcsrchr
memcpy
??_U@YAPAXI@Z
memmove
??2@YAPAXI@Z
free
_CxxThrowException
?_type_info_dtor_internal_method@type_info@@QAEXXZ
TerminateProcess
LocalAlloc
RaiseException
LoadLibraryExW
GetSystemDirectoryW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
VirtualProtect
lstrlenW
MulDiv
FindFirstFileW
GetFullPathNameW
FindNextFileW
FindClose
FindResourceW
SizeofResource
LoadResource
LockResource
MultiByteToWideChar
GetCurrentDirectoryW
LoadLibraryA
GetDriveTypeW
FormatMessageW
CloseHandle
GetFileTime
GetModuleHandleA
GetModuleHandleW
GetFileAttributesW
GetProcAddress
GetVersion
CompareFileTime
LoadLibraryW
GetLastError
SetLastError
GetModuleFileNameW
OutputDebugStringA
LocalFree
FreeLibrary
SysFreeString
GetErrorInfo
VariantInit
VariantClear
SysAllocStringLen
SysAllocString
OleUninitialize
OleInitialize
GetWindowRect
ArrangeIconicWindows
GetWindow
GetWindowLongW
DefFrameProcW
CharLowerW
CharUpperW
GetWindowPlacement
ShowWindow
SetWindowPlacement
PostQuitMessage
EnableMenuItem
ModifyMenuW
InsertMenuW
RemoveMenu
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetMenu
DrawMenuBar
SetFocus
GetForegroundWindow
DestroyAcceleratorTable
DestroyMenu
WaitMessage
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
TranslateMDISysAccel
GetMessageW
PeekMessageW
LoadAcceleratorsW
ReleaseDC
GetDC
LoadMenuW
LoadIconW
LoadStringW
DefWindowProcW
SetWindowPos
DefMDIChildProcW
SendMessageW
IsWindow
UpdateWindow
LoadCursorW
CreateWindowExW
UnregisterClassW
RegisterClassW
SetWindowTextW
IsWindowVisible
SetWindowLongW
SetMenu
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
GetDeviceCaps
DeleteObject
PathFindFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE