Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
fedc6fd0bbf924a9ee1d3719b3eca3b109f8b080724e3f995171fec16347c3f4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fedc6fd0bbf924a9ee1d3719b3eca3b109f8b080724e3f995171fec16347c3f4.exe
Resource
win10v2004-20221111-en
Target
fedc6fd0bbf924a9ee1d3719b3eca3b109f8b080724e3f995171fec16347c3f4
Size
219KB
MD5
99a8654af64313fa64dfa7a80f69cee5
SHA1
d6b6fea6642bdec41e606368b32999c4f253f77a
SHA256
fedc6fd0bbf924a9ee1d3719b3eca3b109f8b080724e3f995171fec16347c3f4
SHA512
fdd356ed09f35e6fae2d60be98faac13e08c92639dcbb719639dabb685cb9632e433c039e0df0cd3dabf4349fc1596bccba806c059c7115021f0549677af3d40
SSDEEP
6144:6HlO4bTiGy99zWbbEutbyKKNlswTGwVvWptdfSP:mlTiG692dy5gLpD6P
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
WriteFile
WinExec
UnmapViewOfFile
SizeofResource
SetEndOfFile
OpenMutexA
MapViewOfFile
LockResource
LoadResource
LoadLibraryA
GlobalFindAtomA
GetWindowsDirectoryA
GetTempPathA
GetSystemDirectoryA
GetProcAddress
GetCurrentThreadId
GetCommandLineA
FreeResource
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
CreateMutexA
CreateFileMappingA
CreateFileA
CopyFileA
CloseHandle
VirtualProtect
GetModuleFileNameA
ExitProcess
GetKeyboardType
MessageBoxA
CharNextA
PostMessageA
GetMessageA
MessageBoxA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ