Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
a953b78cca4366e46a2884724fbdfea0b8db4f9d6de8c387799224e7ccfe23dd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a953b78cca4366e46a2884724fbdfea0b8db4f9d6de8c387799224e7ccfe23dd.exe
Resource
win10v2004-20220812-en
Target
a953b78cca4366e46a2884724fbdfea0b8db4f9d6de8c387799224e7ccfe23dd
Size
261KB
MD5
ceb6baed1d219e43598c438c2f43b9e3
SHA1
09ee4d94eccca6a15bf2550121fd5f88b6965a7b
SHA256
a953b78cca4366e46a2884724fbdfea0b8db4f9d6de8c387799224e7ccfe23dd
SHA512
57876792cc659380fd48579c1610308e5c45f9eb9992f689c1bbc54d3f4ea6651f88aa966e164e9a851f201a3b0eeb684830ffeac094c9131a613a06c82f8895
SSDEEP
6144:iwAn+dlK69pn7n0RwZKQtKmiqa72mA3kYOb:iwjjK6nD0RwZKQtKmng9jr
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCommState
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceA
GetDriveTypeA
GetEnvironmentVariableA
GetFileAttributesA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetStartupInfoA
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
GetWindowsDirectoryA
HeapAlloc
HeapFree
InitializeCriticalSection
IsDBCSLeadByte
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
FreeLibrary
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
OpenProcess
QueryPerformanceCounter
ReadFile
ResetEvent
SetCommState
SetCommTimeouts
SetCurrentDirectoryA
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
lstrlenW
FormatMessageA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsA
ExitThread
ExitProcess
EnterCriticalSection
DeviceIoControl
DeleteFileA
DeleteCriticalSection
DebugBreak
CreateThread
CreateProcessA
CreateMutexA
CreateFileMappingA
CreateEventA
CreateDirectoryA
CopyFileA
CloseHandle
GetSystemDirectoryA
lstrcatA
CreateFileA
LoadLibraryW
LocalFree
GetProcAddress
SetFocus
SetForegroundWindow
SetTimer
SetWindowLongA
SetWindowPos
ShowWindow
SystemParametersInfoA
TranslateMessage
wsprintfA
MessageBoxA
LoadStringA
LoadImageA
IsWindow
InvalidateRect
GetWindowRect
SendMessageA
GetSysColor
GetParent
GetMessageA
GetDlgItem
GetDC
GetClientRect
FindWindowA
ExitWindowsEx
EnumThreadWindows
EnumChildWindows
EndDialog
EnableWindow
DispatchMessageA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CopyRect
SendDlgItemMessageA
ScreenToClient
ReleaseDC
RegisterClassExA
RedrawWindow
PostQuitMessage
GetWindowLongA
CharLowerA
LoadCursorA
LoadIconA
PostMessageA
CreateFontIndirectA
GetDeviceCaps
AddFontResourceA
GetOpenFileNameA
LookupPrivilegeValueA
RegOpenKeyExA
RegOpenKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExW
AdjustTokenPrivileges
AllocateAndInitializeSid
EqualSid
FreeSid
GetTokenInformation
LookupAccountSidA
RegEnumKeyExA
OpenProcessToken
RegCloseKey
RegEnumKeyA
RegQueryValueA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetFileInfoA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
CLSIDFromString
CoCreateInstance
CoInitialize
CoTaskMemAlloc
OleUninitialize
OleInitialize
CoUninitialize
CoTaskMemFree
PropertySheetA
CreatePropertySheetPageA
InitCommonControlsEx
_ftol
wcsncpy
towlower
strtoul
strrchr
strncpy
strncmp
strchr
setlocale
memcpy
_XcptFilter
__getmainargs
__lconv_init
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_mbschr
_mbsinc
_mbslen
_mbsrchr
_stricmp
_strnicmp
_wcsicmp
atoi
exit
free
isleadbyte
isspace
memmove
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ