Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
ae21a02cc4ecfa55f82430c90891bc85848bfeee1f7413908173d9808adb284b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ae21a02cc4ecfa55f82430c90891bc85848bfeee1f7413908173d9808adb284b.exe
Resource
win10v2004-20221111-en
Target
ae21a02cc4ecfa55f82430c90891bc85848bfeee1f7413908173d9808adb284b
Size
224KB
MD5
717abfafaa6abeb01ce2ef032313db3e
SHA1
6b4af985622d0ba4d0b4ac7fe9a771f71d6cdb12
SHA256
ae21a02cc4ecfa55f82430c90891bc85848bfeee1f7413908173d9808adb284b
SHA512
f0fdfea801907478838fbc6911df2264a011751eecf14ae2fb21c87336437bc979ae5901b2fe739ca8e1e6069e118c978e59b0aaae83ff213e9016ec2e00bc90
SSDEEP
3072:W5842KUE2D/d1V0qgsj0o0rjpLIMPnXsblxZfOB5VtiMUuL+xjGkqydRrlrD:E2KUb5D0qVMjh9PXtB5VKEZm
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
HeapAlloc
HeapCreate
GetCurrentThreadId
HeapFree
HeapReAlloc
InterlockedExchange
IsDBCSLeadByte
LCMapStringA
LCMapStringW
LoadLibraryA
MultiByteToWideChar
QueryPerformanceCounter
RtlUnwind
SetEndOfFile
SetFileAttributesA
SetFilePointer
SetHandleCount
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
lstrcmpA
lstrcmpiA
lstrcpynA
lstrlenA
GetCurrentProcess
GetCurrentProcessId
GetCommandLineA
GetCPInfo
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FindNextFileA
FindFirstFileA
FindClose
ExpandEnvironmentStringsA
ExitProcess
DeleteFileA
CreateProcessA
CreateFileA
CreateDirectoryExA
CreateDirectoryA
CopyFileA
CloseHandle
ReadFile
HeapDestroy
VirtualAllocEx
GetStockObject
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegOpenKeyA
RegEnumValueA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
AdjustTokenPrivileges
RegOpenKeyW
RegSetValueExA
CoUninitialize
CoInitialize
CoCreateInstance
PathRemoveFileSpecA
wnsprintfA
StrStrIA
StrCatBuffA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ