Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
f2a9bc690ad2b0a19fdf4c12564b0ba5d347c54bc67c38a4d229b95bfc1894ac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f2a9bc690ad2b0a19fdf4c12564b0ba5d347c54bc67c38a4d229b95bfc1894ac.exe
Resource
win10v2004-20220901-en
Target
f2a9bc690ad2b0a19fdf4c12564b0ba5d347c54bc67c38a4d229b95bfc1894ac
Size
323KB
MD5
08c290db7cb9a1b47ad77cfecd092ce8
SHA1
72ef0479e271076f8757baf715745726bceb926b
SHA256
f2a9bc690ad2b0a19fdf4c12564b0ba5d347c54bc67c38a4d229b95bfc1894ac
SHA512
122f2e97e8e8f21d993fdb6111e57a850700975762b2c5799655b4679b4181ba688cb6e9c1c37e2aaf58135618825718ad786c16eb1375ea183d94fe9c14ecd9
SSDEEP
6144:Kqfbwfwd99vxoYCV+Li9IBCiiortLeu9ZvLmE7JWAT:Vfbos9DoPvorsuzCQJBT
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetThreadLocale
GetWindowsDirectoryA
lstrlenA
lstrcpyA
CreateFileA
Module32Next
GlobalFindAtomA
FindFirstVolumeMountPointW
HeapLock
GetPrivateProfileSectionW
GetCommandLineW
LoadLibraryExA
PeekConsoleInputW
GetLogicalDriveStringsW
VerLanguageNameW
SetCommConfig
GetWindowsDirectoryW
CreatePipe
Sleep
GetConsoleScreenBufferInfo
GetFileAttributesExA
GetTempPathA
GetTempPathW
Module32FirstW
Process32FirstW
Heap32Next
RtlZeroMemory
SetSystemPowerState
WriteTapemark
RtlMoveMemory
GetCPInfoExW
GetPrivateProfileSectionNamesW
GetStringTypeExW
GetStringTypeA
_lclose
SetConsoleTitleW
CommConfigDialogW
GetAtomNameW
SetFileApisToANSI
FindFirstFileExA
LockFileEx
GetCPInfoExA
VirtualProtectEx
lstrcpynA
SetCommState
FindResourceExW
CancelWaitableTimer
WriteProfileSectionA
LocalShrink
GetProfileIntW
OpenThread
MoveFileWithProgressW
BindIoCompletionCallback
CreateMutexA
SignalObjectAndWait
OpenMutexA
WriteFileGather
GetConsoleAliasExesA
FlushInstructionCache
FileTimeToDosDateTime
GetThreadSelectorEntry
GetLongPathNameW
SetConsoleCursorInfo
Thread32Next
SetLocaleInfoA
LocalHandle
Process32Next
HeapCreate
ReadConsoleA
IsBadWritePtr
ScrollConsoleScreenBufferW
TlsAlloc
UpdateResourceW
BuildCommDCBA
GetBinaryTypeA
MultiByteToWideChar
UnmapViewOfFile
SetCurrentDirectoryW
RemoveDirectoryW
GlobalDeleteAtom
GetDriveTypeA
LeaveCriticalSection
CallNamedPipeA
VirtualQueryEx
VerifyVersionInfoW
FindNextVolumeA
FindFirstFileW
IsBadStringPtrA
GetSystemWindowsDirectoryW
CloseHandle
FileTimeToSystemTime
WritePrivateProfileStructA
lstrcmpW
GlobalFlags
SetConsoleOutputCP
LoadIconW
RegOpenKeyExW
SHGetDataFromIDListW
SHGetFileInfoW
DragQueryPoint
SHInvokePrinterCommandA
SHGetInstanceExplorer
Shell_NotifyIcon
SHFileOperation
SHEmptyRecycleBinA
ExtractIconExA
FindExecutableW
ExtractAssociatedIconExW
SHGetFileInfoA
SHCreateDirectoryExA
ShellExecuteExA
ShellExecuteA
WOWShellExecute
SHFormatDrive
SHBrowseForFolderA
CheckEscapesW
SHGetDesktopFolder
SHGetFolderLocation
CommandLineToArgvW
DragQueryFileA
DragQueryFileW
SHLoadInProc
ShellExecuteW
SHLoadNonloadedIconOverlayIdentifiers
DragFinish
SHGetPathFromIDList
SHAddToRecentDocs
SHGetPathFromIDListW
SHPathPrepareForWriteA
ExtractIconW
ShellAboutW
ExtractAssociatedIconW
Shell_NotifyIconA
SHGetIconOverlayIndexA
ExtractIconEx
ShellExecuteEx
DragAcceptFiles
ShellHookProc
DragQueryFile
SHQueryRecycleBinW
ExtractIconExW
ExtractAssociatedIconExA
SHBrowseForFolder
SHGetMalloc
ExtractAssociatedIconA
SHQueryRecycleBinA
SHChangeNotify
SHGetSpecialFolderPathW
SHBrowseForFolderW
ExtractIconA
SHGetSettings
SHFileOperationA
SHGetFolderPathA
FindExecutableA
ShellExecuteExW
SHIsFileAvailableOffline
SHFileOperationW
SHCreateDirectoryExW
SHPathPrepareForWriteW
SHRegEnumUSValueA
PathMakeSystemFolderA
PathSetDlgItemPathA
SHRegGetBoolUSValueW
SHRegSetUSValueW
SHRegWriteUSValueA
PathAddExtensionA
ord16
PathIsUNCA
SHSkipJunction
StrTrimW
UrlIsOpaqueA
PathFindExtensionA
PathRelativePathToA
PathIsUNCServerA
PathMatchSpecW
SHEnumValueW
SHSetThreadRef
SHRegEnumUSKeyA
PathAppendW
ColorAdjustLuma
UrlCanonicalizeA
SHStrDupW
StrToIntExW
wvnsprintfW
AssocQueryStringA
PathAddBackslashA
SHEnumKeyExA
PathRemoveArgsW
ChrCmpIA
SHGetInverseCMAP
PathSetDlgItemPathW
SHOpenRegStreamA
StrCSpnIW
PathAddExtensionW
PathGetDriveNumberW
PathIsSameRootW
StrPBrkA
PathIsDirectoryEmptyA
SHDeleteEmptyKeyA
PathCanonicalizeA
AssocQueryKeyW
PathUnquoteSpacesA
StrChrIW
wnsprintfW
StrCpyNW
StrCSpnW
StrToIntW
SHRegDeleteEmptyUSKeyW
PathRemoveBackslashA
PathIsLFNFileSpecA
PathCompactPathW
SHRegQueryUSValueA
SHIsLowMemoryMachine
UrlCombineA
PathFindFileNameA
PathIsUNCServerShareA
PathIsUNCServerShareW
SHRegWriteUSValueW
UrlCompareW
SHRegQueryInfoUSKeyW
StrRStrIA
PathIsContentTypeW
PathParseIconLocationA
StrStrA
PathGetDriveNumberA
PathGetArgsA
SHDeleteEmptyKeyW
SHRegOpenUSKeyA
StrToIntExA
UrlCreateFromPathW
PathUndecorateW
StrFromTimeIntervalW
StrRChrA
PathCombineA
PathIsSystemFolderW
SHRegDeleteUSValueW
StrCpyW
AssocQueryStringByKeyW
UrlCreateFromPathA
AssocQueryStringW
SHRegEnumUSValueW
SHGetValueW
PathIsDirectoryEmptyW
StrRStrIW
StrChrA
StrRChrIW
StrRChrIA
StrStrIW
StrCmpNIW
StrStrIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ