Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
74f4cded4e2abcb46b73434342f4787444f3ac1976eee97da530d1bac313e772.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74f4cded4e2abcb46b73434342f4787444f3ac1976eee97da530d1bac313e772.exe
Resource
win10v2004-20220901-en
Target
74f4cded4e2abcb46b73434342f4787444f3ac1976eee97da530d1bac313e772
Size
497KB
MD5
4059c5d549a41d0d8a48ef80888ee298
SHA1
d86b946aa59ddcadd7ea609ce12d69e237c78eb8
SHA256
74f4cded4e2abcb46b73434342f4787444f3ac1976eee97da530d1bac313e772
SHA512
2392771cd28e90c2105e750bbb2895721ec8814547b6b7ce340a1d381031731f907a623a0d58a9c245bb1ced0fb298a03bc3f90fed5fee2870a94a20705446f6
SSDEEP
12288:Nyfwlfe+C5IxJ845HYV5sxOH/cccccccev4:Nxliav84a5sxa4
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FormatMessageA
LocalAlloc
FreeLibrary
InterlockedExchange
GetModuleFileNameA
CreateEventA
GetModuleHandleA
SetPriorityClass
GetCurrentThread
GetCommandLineA
GetEnvironmentVariableA
SetConsoleCtrlHandler
GetCurrentProcess
DuplicateHandle
GetStdHandle
GetPriorityClass
CreateProcessA
SetStdHandle
SetLastError
GetVersionExA
LoadLibraryA
GetProcAddress
InitializeCriticalSection
RaiseException
CreateNamedPipeA
CreateFileA
GetLastError
AllocConsole
OutputDebugStringA
WriteFile
ExitProcess
InterlockedDecrement
ReadFile
GetCurrentProcessId
SetEvent
Sleep
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
WaitForSingleObject
CloseHandle
SetThreadPriority
CreateThread
VirtualAlloc
LoadCursorA
MessageBeep
InvalidateRect
KillTimer
PostQuitMessage
DefWindowProcA
RegisterClassExW
GetStockObject
exit
_cexit
_XcptFilter
__initenv
_c_exit
_stricmp
atoi
__getmainargs
_exit
_initterm
__setusermatherr
strrchr
sscanf
_strnicmp
strtoul
rewind
calloc
fgetc
tolower
_strcmpi
getenv
printf
isspace
fopen
_snprintf
strncpy
_iob
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
fgets
fclose
sprintf
_spawnlp
_vsnprintf
wcsncpy
strstr
_purecall
_wtoi
memmove
wcsncmp
_itow
wcslen
free
malloc
wcscmp
strchr
ceil
strncat
time
wcsncat
wcstok
_wcsupr
iswalnum
_strlwr
_ftol
wcsrchr
swscanf
_wcslwr
wcsstr
_wtol
strpbrk
iswalpha
iswdigit
wcspbrk
iswspace
_snwprintf
towupper
wcschr
_wcsicmp
_wcsnicmp
_onexit
__dllonexit
_endthread
_beginthreadex
_acmdln
_vsnwprintf
RegSetValueExA
RegSetValueExW
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExW
RegOpenKeyExA
RegDeleteValueW
RegDeleteValueA
RegDeleteKeyW
RegDeleteKeyA
RegEnumValueW
RegEnumValueA
RegCreateKeyExW
RegCreateKeyExA
RegQueryValueExW
RegEnumKeyExA
RegEnumKeyExW
RegCloseKey
LookupPrivilegeValueA
LookupPrivilegeValueW
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
InitiateSystemShutdownExW
CloseServiceHandle
QueryServiceStatus
EnumDependentServicesW
ControlService
OpenServiceW
OpenSCManagerW
StartServiceW
RegQueryValueExA
RegOpenKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ