Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
b976984920c54b57a9ca2830b193f8c45f0604bfea548b06f24517fc954f2ce3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b976984920c54b57a9ca2830b193f8c45f0604bfea548b06f24517fc954f2ce3.exe
Resource
win10v2004-20220901-en
Target
b976984920c54b57a9ca2830b193f8c45f0604bfea548b06f24517fc954f2ce3
Size
273KB
MD5
0c61f6a676971a6ffda4020e0c030a00
SHA1
b84f3819e9e46bacdf6c36601c0dede60eb9884f
SHA256
b976984920c54b57a9ca2830b193f8c45f0604bfea548b06f24517fc954f2ce3
SHA512
a9249b549e2294e39f0fce9318e3358d0cc70a9af2c78e68d71b848b7e9723ff62ebff66421112504774564a4d4f425dd46237236ade33084fbdbb3790ddbf81
SSDEEP
6144:Vpq1ZaodnmCi6jYO4ByNjc0NoZUPSMJ14scw6I:Vpqn1mKv4Byhc0GZlMJ14scw6I
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetSystemDirectoryA
VirtualAllocEx
CloseHandle
ReadFile
CompareStringW
FileTimeToSystemTime
FindClose
FindFirstFileW
FormatMessageW
GetComputerNameExW
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeW
GetLastError
GetLogicalDrives
GetModuleHandleA
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
lstrcatA
HeapAlloc
HeapFree
LoadLibraryA
LocalFree
OpenProcess
QueryPerformanceCounter
ReadConsoleW
SetConsoleCursorPosition
SetConsoleMode
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
WideCharToMultiByte
WriteConsoleW
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
GetVolumeInformationW
CreateFileA
EndDialog
GetDesktopWindow
GetDlgItem
IsDlgButtonChecked
LoadStringW
MessageBoxW
SetFocus
EnableWindow
DialogBoxParamW
RegOpenKeyA
CoUninitialize
CoCreateInstance
CoInitializeEx
realloc
malloc
free
memcpy
_acmdln
_cexit
_controlfp
exit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ