Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
fdf95116911c01579b6f0c5f8e447d44fb74d2483752db06e3a32572a016bd8b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fdf95116911c01579b6f0c5f8e447d44fb74d2483752db06e3a32572a016bd8b.exe
Resource
win10v2004-20220901-en
Target
fdf95116911c01579b6f0c5f8e447d44fb74d2483752db06e3a32572a016bd8b
Size
333KB
MD5
27c0e8007875c8ac735119c875c64fb6
SHA1
e16c53c276c838ef13fff2c3d03f177025aa9494
SHA256
fdf95116911c01579b6f0c5f8e447d44fb74d2483752db06e3a32572a016bd8b
SHA512
e0a7188a90e0cf67c42d66492271e9bdb8b4e847e938f9fbeb6a161441a79f9aaeec801e70b2918c9d3317b9af6e6b9e4815d8c7d91d68e6747e51a2953292a2
SSDEEP
6144:0divYYrQOEFR22Lz/J8qb5bPRvjRoyO2ElZI8lHfSsxnagTrFF3b/f5n4g:0diQkQDR2K8wbDoyO2ElZz73TZdN
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryExA
ReadFile
VirtualAllocEx
CloseHandle
CopyFileW
CreateFileW
CreateProcessW
CreateThread
DeleteFileW
ExitProcess
ExpandEnvironmentStringsW
FileTimeToDosDateTime
FileTimeToLocalFileTime
FormatMessageA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapFree
LocalAlloc
LocalFree
QueryPerformanceCounter
SetCurrentDirectoryA
SetErrorMode
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
LoadIconA
GetSysColor
LoadCursorA
memset
_XcptFilter
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_ftol
_initterm
_ltow
_wcslwr
_wfopen
_wfullpath
_wsplitpath
exit
fclose
floor
fwprintf
swprintf
wcsncpy
wcsstr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ