Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
bdba883ab8d3ada785471e1c7bda5a05ab7ee9ea3a4b1e33bbf53f30c8721aa0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdba883ab8d3ada785471e1c7bda5a05ab7ee9ea3a4b1e33bbf53f30c8721aa0.exe
Resource
win10v2004-20221111-en
Target
bdba883ab8d3ada785471e1c7bda5a05ab7ee9ea3a4b1e33bbf53f30c8721aa0
Size
497KB
MD5
7572488eb72264c84a93ef98a38263e5
SHA1
5bd6c9f5e956bc5247a5efa828e09c8baacf8a0a
SHA256
bdba883ab8d3ada785471e1c7bda5a05ab7ee9ea3a4b1e33bbf53f30c8721aa0
SHA512
bdd128bfb40b383c00e14202cca7fc2bd2ff3b95f4017ceadca5f92b8c657fc7e584e846e97addd771e6199fd4871728743e4c3c6f066eae01e455ffbbeb7c85
SSDEEP
12288:ry2wlhT+C5IxJ845HYV5sxOH/ccccccceFl:rKl1av84a5sxcl
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FormatMessageA
LocalAlloc
FreeLibrary
InterlockedExchange
GetModuleFileNameA
CreateEventA
GetModuleHandleA
SetPriorityClass
GetCurrentThread
GetCommandLineA
GetEnvironmentVariableA
SetConsoleCtrlHandler
GetCurrentProcess
DuplicateHandle
GetStdHandle
GetPriorityClass
CreateProcessA
SetStdHandle
SetLastError
GetVersionExA
LoadLibraryA
GetProcAddress
InitializeCriticalSection
RaiseException
CreateNamedPipeA
CreateFileA
GetLastError
AllocConsole
OutputDebugStringA
WriteFile
ExitProcess
InterlockedDecrement
ReadFile
GetCurrentProcessId
SetEvent
Sleep
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
WaitForSingleObject
CloseHandle
SetThreadPriority
CreateThread
VirtualAlloc
LoadCursorA
MessageBeep
InvalidateRect
KillTimer
PostQuitMessage
DefWindowProcA
RegisterClassExW
GetStockObject
exit
_cexit
_XcptFilter
__initenv
_c_exit
_stricmp
atoi
__getmainargs
_exit
_initterm
__setusermatherr
strrchr
sscanf
_strnicmp
strtoul
rewind
calloc
fgetc
tolower
_strcmpi
getenv
printf
isspace
fopen
_snprintf
strncpy
_iob
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
fgets
fclose
sprintf
_spawnlp
_vsnprintf
wcsncpy
strstr
_purecall
_wtoi
memmove
wcsncmp
_itow
wcslen
free
malloc
wcscmp
strchr
ceil
strncat
time
wcsncat
wcstok
_wcsupr
iswalnum
_strlwr
_ftol
wcsrchr
swscanf
_wcslwr
wcsstr
_wtol
strpbrk
iswalpha
iswdigit
wcspbrk
iswspace
_snwprintf
towupper
wcschr
_wcsicmp
_wcsnicmp
_onexit
__dllonexit
_endthread
_beginthreadex
_acmdln
_vsnwprintf
RegSetValueExA
RegSetValueExW
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExW
RegOpenKeyExA
RegDeleteValueW
RegDeleteValueA
RegDeleteKeyW
RegDeleteKeyA
RegEnumValueW
RegEnumValueA
RegCreateKeyExW
RegCreateKeyExA
RegQueryValueExW
RegEnumKeyExA
RegEnumKeyExW
RegCloseKey
LookupPrivilegeValueA
LookupPrivilegeValueW
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
InitiateSystemShutdownExW
CloseServiceHandle
QueryServiceStatus
EnumDependentServicesW
ControlService
OpenServiceW
OpenSCManagerW
StartServiceW
RegQueryValueExA
RegOpenKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ