Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
127cea485227ffe84e4a9981a07a5a91701ffac9fb7ed918566d71e3f8b7de04.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
127cea485227ffe84e4a9981a07a5a91701ffac9fb7ed918566d71e3f8b7de04.exe
Resource
win10v2004-20220812-en
Target
127cea485227ffe84e4a9981a07a5a91701ffac9fb7ed918566d71e3f8b7de04
Size
333KB
MD5
09203ce9932ecd39a68ab627bf6ab9c3
SHA1
418606334b8435b264a5be40bbc657149fdf7c0e
SHA256
127cea485227ffe84e4a9981a07a5a91701ffac9fb7ed918566d71e3f8b7de04
SHA512
f132087d99b3c54e23e0e654b1d5392bc0409cac95b9c65efe6becbf3065a1285df24bd682b3b8d3190bd9d3fea63b174847a706e12e7b089395670969c07a80
SSDEEP
6144:ROXev74zue74KwdT1e9Yr6SLFdVB43K7H9DSbqLZFF3bhnznBnOnGF:Nte8l1WIzZdMeAEddzBOGF
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryExA
ReadFile
VirtualAllocEx
CloseHandle
CopyFileW
CreateFileW
CreateProcessW
CreateThread
DeleteFileW
ExitProcess
ExpandEnvironmentStringsW
FileTimeToDosDateTime
FileTimeToLocalFileTime
FormatMessageA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapFree
LocalAlloc
LocalFree
QueryPerformanceCounter
SetCurrentDirectoryA
SetErrorMode
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
LoadIconA
GetSysColor
LoadCursorA
memset
_XcptFilter
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_ftol
_initterm
_ltow
_wcslwr
_wfopen
_wfullpath
_wsplitpath
exit
fclose
floor
fwprintf
swprintf
wcsncpy
wcsstr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.