Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
cd8ede451826fcbe666fb7c099cb92e2f8244427b70a481863ea241b2ff9108c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd8ede451826fcbe666fb7c099cb92e2f8244427b70a481863ea241b2ff9108c.exe
Resource
win10v2004-20220812-en
Target
cd8ede451826fcbe666fb7c099cb92e2f8244427b70a481863ea241b2ff9108c
Size
107KB
MD5
a8ac0f96d28dbc1b6262307f80b09b96
SHA1
703881fa603d2da182e271a42dbeb08fa1857c6a
SHA256
cd8ede451826fcbe666fb7c099cb92e2f8244427b70a481863ea241b2ff9108c
SHA512
1979e8777a63c16069d26ada42fac126e92fb0e0186fce3238a37d979d3af7193134c974ce56c952836cf13ccb39a2b975a541ccb6c83fb380f903f42108c4a1
SSDEEP
768:yijmw0L400kvFCT/46+zLsMkXDG/9OUh6pkc4i9EGkjBf3yhl1FwxV9CO5T58A5I:y+mLr9CT/1u6C8knJsFX2x2PTz5xl
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcessHeap
CreateFileW
lstrcatW
GetWindowsDirectoryW
LoadLibraryA
GetProcAddress
GetSystemInfo
AssignProcessToJobObject
BackupRead
BackupWrite
CallNamedPipeW
CloseHandle
CompareStringW
CreateDirectoryExA
CreateEventW
CreateHardLinkW
CreateSemaphoreW
DebugActiveProcess
DefineDosDeviceW
DeleteVolumeMountPointW
EnumSystemLocalesA
FileTimeToLocalFileTime
FindFirstChangeNotificationW
FindFirstFileExA
FindFirstVolumeMountPointW
FindNextVolumeMountPointW
FoldStringA
FreeResource
GetACP
GetCalendarInfoW
GetCommProperties
GetCommandLineW
GetCompressedFileSizeW
GetComputerNameW
GetConsoleAliasExesW
GetConsoleAliasW
GetCurrentProcess
GetDiskFreeSpaceExA
GetDiskFreeSpaceW
GetDriveTypeW
GetEnvironmentVariableA
GetFileAttributesA
GetFileInformationByHandle
GetLocalTime
GetLogicalDrives
GetModuleHandleA
GetNamedPipeInfo
GetPrivateProfileSectionA
GetProfileSectionW
GetShortPathNameA
GetStringTypeExA
GetSystemWindowsDirectoryA
GetTempFileNameA
GetTempPathW
GetThreadSelectorEntry
GetUserDefaultLangID
GetUserDefaultUILanguage
GetVolumeInformationW
GetVolumePathNameA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalUnWire
GlobalUnfix
HeapAlloc
HeapWalk
InitializeCriticalSection
InterlockedExchange
InterlockedIncrement
IsValidLocale
LockFile
Module32Next
MoveFileWithProgressW
OpenJobObjectA
PurgeComm
ReadConsoleOutputA
ReadConsoleOutputCharacterA
ReadFileScatter
ResetEvent
SetCommMask
SetEvent
SetFileAttributesA
SetFilePointerEx
SetInformationJobObject
SetLocaleInfoA
SetPriorityClass
SetThreadIdealProcessor
SetThreadLocale
SetTimeZoneInformation
SetUnhandledExceptionFilter
SetupComm
SystemTimeToFileTime
UnlockFile
WaitForMultipleObjectsEx
WideCharToMultiByte
WriteFileEx
WriteProcessMemory
_lwrite
lstrcmpi
lstrcpyW
lstrcpyn
lstrcpynA
memset
InsertMenuItemW
wsprintfA
AllowSetForegroundWindow
CharLowerA
CharNextA
CharUpperA
ClientToScreen
DdeCreateStringHandleA
DeferWindowPos
DeregisterShellHookWindow
DestroyAcceleratorTable
DialogBoxParamW
EnableScrollBar
EndPaint
EnumClipboardFormats
EnumWindowStationsA
GetActiveWindow
GetAltTabInfo
GetCapture
GetClassLongW
GetClassWord
GetClientRect
GetKeyState
GetKeyboardLayoutList
GetMenuCheckMarkDimensions
GetMenuDefaultItem
GetMenuItemID
GetMenuItemRect
GetMonitorInfoW
GetUserObjectInformationA
GetWindowInfo
GetWindowTextLengthA
GetWindowThreadProcessId
GrayStringW
IsWindowEnabled
LoadCursorA
LoadIconA
LoadKeyboardLayoutW
MoveWindow
NotifyWinEvent
OffsetRect
OpenClipboard
OpenIcon
RealChildWindowFromPoint
RealGetWindowClassA
RealGetWindowClassW
RemovePropA
ScrollDC
SendIMEMessageExW
SendMessageCallbackA
SendMessageW
SetMenuContextHelpId
SetParent
SetProcessWindowStation
SetThreadDesktop
SetUserObjectInformationW
SetWindowPlacement
SetWindowRgn
ShowWindow
SwitchDesktop
ToUnicode
TrackPopupMenu
TranslateMessage
UnhookWinEvent
UnregisterDeviceNotification
VkKeyScanW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ