Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
af3a164a98ce11293f40447a22bbf02bb2e6d08818c5c1187e4a25cb9cff0b1d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
af3a164a98ce11293f40447a22bbf02bb2e6d08818c5c1187e4a25cb9cff0b1d.exe
Resource
win10v2004-20221111-en
Target
af3a164a98ce11293f40447a22bbf02bb2e6d08818c5c1187e4a25cb9cff0b1d
Size
90KB
MD5
b6b476571ce29fd97d9e6969d947d073
SHA1
0202d51f67ccc8e11e305689e15b14d283dd4191
SHA256
af3a164a98ce11293f40447a22bbf02bb2e6d08818c5c1187e4a25cb9cff0b1d
SHA512
a6be094065b5c2655a029f23e619f33e128658a45f7c30a06508a1882d774f122dac1a20b9a391364f819f17eab7f18a7e2ff46aee60bfa5d22fd86f943965b1
SSDEEP
768:kJSkCis89kYOolNumYFwiPJPCTKoNfaMWhUz1Iz0ghUz1Iz028hUz1Iz0thUz1I4:iK5m4wiPw2op
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileMappingA
CreateThread
DebugBreak
DeleteFileA
DeviceIoControl
EnterCriticalSection
ExitProcess
ExitThread
ExpandEnvironmentStringsA
FileTimeToDosDateTime
FileTimeToLocalFileTime
FormatMessageA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetModuleFileNameA
GetProcAddress
GetProcessHeap
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
CloseHandle
IsDBCSLeadByte
LoadLibraryExA
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
OpenProcess
QueryPerformanceCounter
ReadFile
SetCommTimeouts
SetCurrentDirectoryA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForMultipleObjects
WideCharToMultiByte
lstrcpynA
lstrlenW
GetSystemDirectoryA
lstrcatA
CreateFileA
GetStartupInfoA
GetTickCount
VirtualAllocEx
SetClipboardViewer
SendMessageA
InvalidateRect
BeginPaint
GetClientRect
DefWindowProcA
GetDeviceCaps
AddFontResourceA
CreateFontIndirectA
RegOpenKeyExW
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE