Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
749dd92124cb1bb8e3e49bd855a8b4f504c87cbe500b93be5cc1b693451cdb9a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
749dd92124cb1bb8e3e49bd855a8b4f504c87cbe500b93be5cc1b693451cdb9a.exe
Resource
win10v2004-20221111-en
Target
749dd92124cb1bb8e3e49bd855a8b4f504c87cbe500b93be5cc1b693451cdb9a
Size
497KB
MD5
5fc2aca6e9f238faeb4075a2b4e652c5
SHA1
5f5c26d7af930092ca781ec7ad861e08164d52e4
SHA256
749dd92124cb1bb8e3e49bd855a8b4f504c87cbe500b93be5cc1b693451cdb9a
SHA512
df841c983c95413b61eaabc8cc4bc206cd238af75826f7422e3334055677a64cddfc450de01a0e43b27d807d71b1a61a2d9129bf645d80e91745f0b34a541034
SSDEEP
12288:wydwl6K+C5IxJ845HYV5sxOH/cccccccegk:w7lFav84a5sxZk
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FormatMessageA
LocalAlloc
FreeLibrary
InterlockedExchange
GetModuleFileNameA
CreateEventA
GetModuleHandleA
SetPriorityClass
GetCurrentThread
GetCommandLineA
GetEnvironmentVariableA
SetConsoleCtrlHandler
GetCurrentProcess
DuplicateHandle
GetStdHandle
GetPriorityClass
CreateProcessA
SetStdHandle
SetLastError
GetVersionExA
LoadLibraryA
GetProcAddress
InitializeCriticalSection
RaiseException
CreateNamedPipeA
CreateFileA
GetLastError
AllocConsole
OutputDebugStringA
WriteFile
ExitProcess
InterlockedDecrement
ReadFile
GetCurrentProcessId
SetEvent
Sleep
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
WaitForSingleObject
CloseHandle
SetThreadPriority
CreateThread
VirtualAlloc
LoadCursorA
MessageBeep
InvalidateRect
KillTimer
PostQuitMessage
DefWindowProcA
RegisterClassExW
GetStockObject
exit
_cexit
_XcptFilter
__initenv
_c_exit
_stricmp
atoi
__getmainargs
_exit
_initterm
__setusermatherr
strrchr
sscanf
_strnicmp
strtoul
rewind
calloc
fgetc
tolower
_strcmpi
getenv
printf
isspace
fopen
_snprintf
strncpy
_iob
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
fgets
fclose
sprintf
_spawnlp
_vsnprintf
wcsncpy
strstr
_purecall
_wtoi
memmove
wcsncmp
_itow
wcslen
free
malloc
wcscmp
strchr
ceil
strncat
time
wcsncat
wcstok
_wcsupr
iswalnum
_strlwr
_ftol
wcsrchr
swscanf
_wcslwr
wcsstr
_wtol
strpbrk
iswalpha
iswdigit
wcspbrk
iswspace
_snwprintf
towupper
wcschr
_wcsicmp
_wcsnicmp
_onexit
__dllonexit
_endthread
_beginthreadex
_acmdln
_vsnwprintf
RegSetValueExA
RegSetValueExW
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExW
RegOpenKeyExA
RegDeleteValueW
RegDeleteValueA
RegDeleteKeyW
RegDeleteKeyA
RegEnumValueW
RegEnumValueA
RegCreateKeyExW
RegCreateKeyExA
RegQueryValueExW
RegEnumKeyExA
RegEnumKeyExW
RegCloseKey
LookupPrivilegeValueA
LookupPrivilegeValueW
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
InitiateSystemShutdownExW
CloseServiceHandle
QueryServiceStatus
EnumDependentServicesW
ControlService
OpenServiceW
OpenSCManagerW
StartServiceW
RegQueryValueExA
RegOpenKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ