Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
b88f183eba2f97af6c81886b1a2c740bd1ab9f5ead1c1666aa850e4e3a14951e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b88f183eba2f97af6c81886b1a2c740bd1ab9f5ead1c1666aa850e4e3a14951e.exe
Resource
win10v2004-20221111-en
Target
b88f183eba2f97af6c81886b1a2c740bd1ab9f5ead1c1666aa850e4e3a14951e
Size
333KB
MD5
0e81d4c72d98fc3533ee2ee0f293a254
SHA1
0e0c40ea45633ade4778561254b215e89f9aab85
SHA256
b88f183eba2f97af6c81886b1a2c740bd1ab9f5ead1c1666aa850e4e3a14951e
SHA512
859a16cc0d7ce705c40fe2467990d2378df05f422bcb4697385e313933b2ea206a570da57f45a967d75f10e800fbc6434b434cfc8787b00d812d5ec26c8a893d
SSDEEP
6144:BdiviYrQOEFR22Lz/J8qb5bPRvjR3yO2ElZI8lHfSsxnagTpFF3bmf5n4y:BdiKkQDR2K8wbD3yO2ElZz73TTdY
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryExA
ReadFile
VirtualAllocEx
CloseHandle
CopyFileW
CreateFileW
CreateProcessW
CreateThread
DeleteFileW
ExitProcess
ExpandEnvironmentStringsW
FileTimeToDosDateTime
FileTimeToLocalFileTime
FormatMessageA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapFree
LocalAlloc
LocalFree
QueryPerformanceCounter
SetCurrentDirectoryA
SetErrorMode
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
LoadIconA
GetSysColor
LoadCursorA
memset
_XcptFilter
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_ftol
_initterm
_ltow
_wcslwr
_wfopen
_wfullpath
_wsplitpath
exit
fclose
floor
fwprintf
swprintf
wcsncpy
wcsstr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ