Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
c6d742203f5b7e5b9f1112a21d5b427e5c48e07e16b042e25650fd6495e0ab03.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6d742203f5b7e5b9f1112a21d5b427e5c48e07e16b042e25650fd6495e0ab03.exe
Resource
win10v2004-20221111-en
Target
c6d742203f5b7e5b9f1112a21d5b427e5c48e07e16b042e25650fd6495e0ab03
Size
150KB
MD5
5b4ee9d4c368f04533044568db2705f5
SHA1
5c2ee2cb88e45760a7e366e3537557a51e1f6456
SHA256
c6d742203f5b7e5b9f1112a21d5b427e5c48e07e16b042e25650fd6495e0ab03
SHA512
71b5e2bd037cd39e2c831ada5ad1df34014f28eca44e859169da729254714c1dadb4896ffbfbacb452d1b7ae2f1d5de032aa7ae0be8300f90db4fe652bbc4016
SSDEEP
3072:YEsWXgbebo9ySYLHXOpULn0waRwUuj+fvacOVNpkl0:YE3XgsnO+L0PHaVNpkl0
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ReadFile
ExitProcess
VirtualAllocEx
SetUnhandledExceptionFilter
GetCommandLineW
GetModuleHandleW
WideCharToMultiByte
VirtualAlloc
VirtualFree
GetTempFileNameA
GetWindowsDirectoryA
FileTimeToSystemTime
ExpandEnvironmentStringsA
SearchPathA
GetTempPathA
GetFileAttributesA
CopyFileA
CreateFileA
DeleteFileA
CompareFileTime
CompareStringA
GetLocaleInfoW
FormatMessageA
GetSystemTime
IsBadStringPtrA
IsBadStringPtrW
IsBadWritePtr
ResumeThread
TerminateThread
WaitForMultipleObjects
GetSystemDefaultLCID
lstrcpyW
SetLastError
FlushInstructionCache
lstrcmpiA
lstrcmpA
SetFilePointer
MoveFileExW
SetErrorMode
CreateFileMappingA
CreateMutexA
DuplicateHandle
CreateProcessW
ReleaseMutex
GlobalLock
GlobalUnlock
VirtualQuery
GetSystemInfo
GetVersion
VirtualProtect
FindClose
MoveFileW
LocalAlloc
IsDBCSLeadByteEx
GlobalAlloc
SetThreadLocale
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
LocalFree
OpenEventW
SetEvent
ResetEvent
DeleteFileW
CompareStringW
WriteFile
lstrcpynW
lstrcmpW
lstrlenW
lstrcmpiW
CreateFileW
GetLastError
GetFileSize
MultiByteToWideChar
LoadLibraryW
GetProcAddress
FreeLibrary
GetTickCount
lstrlenA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
Sleep
CreateEventW
CreateThread
InterlockedDecrement
InterlockedIncrement
WaitForSingleObject
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
GetCurrentThread
FindResourceA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
RaiseException
GetVersionExW
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
BeginPaint
GetClientRect
EndPaint
PostQuitMessage
DefWindowProcA
LoadCursorW
SetCursor
DialogBoxParamW
GetForegroundWindow
SetForegroundWindow
EndDialog
GetWindowTextW
SetWindowTextW
SetFocus
SetTimer
GetDlgItem
SendMessageW
GetWindowRect
MapDialogRect
PostMessageW
KillTimer
MessageBoxA
MessageBoxW
CharLowerW
GetStockObject
CreateEnhMetaFileA
Rectangle
MoveToEx
LineTo
CloseEnhMetaFile
PlayEnhMetaFile
DeleteEnhMetaFile
RegOpenKeyExA
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegEnumValueW
RegDeleteKeyW
GetUserNameW
RegDeleteValueW
CoUninitialize
CoInitializeEx
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ