Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
660687dfc5542bdd29153570181453d99892595aef1a6b0ef1c758530330d717.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
660687dfc5542bdd29153570181453d99892595aef1a6b0ef1c758530330d717.exe
Resource
win10v2004-20220812-en
Target
660687dfc5542bdd29153570181453d99892595aef1a6b0ef1c758530330d717
Size
1.4MB
MD5
1ab7a71b8ec063407739137893df2a5f
SHA1
e3342b0d3de0a147b9f4c3cedd6fdf16fcefdd68
SHA256
660687dfc5542bdd29153570181453d99892595aef1a6b0ef1c758530330d717
SHA512
07f777994e5258324ced757bf943f18cb294767742c0f94e0542060b828206ead821c83c546e7596e1ce4eaf2a7344d4fcc68b18ae710460aaa19972ff20501c
SSDEEP
24576:SmgzXkPaXR1S4bGoFEi+3bNR1o5o+JBpZ8BOGga/sca087JJ34EXo:ezVXxFEvTyeO8BOG9/s90k341
ExtKeyUsageCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32First
OpenProcess
TerminateProcess
CloseHandle
Process32Next
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
WaitForSingleObject
CreateProcessA
GetStartupInfoA
Sleep
CreateDirectoryA
WriteFile
CreateFileA
GetCommandLineA
GetVersion
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
GetProcAddress
RaiseException
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
LoadLibraryA
SetFilePointer
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
MessageBoxA
wsprintfA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ