Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2de04e13336ff4ffa178ac4999670000c33c2b0b57a688b94ec1410d9e331212.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2de04e13336ff4ffa178ac4999670000c33c2b0b57a688b94ec1410d9e331212.exe
Resource
win10v2004-20230220-en
Target
2de04e13336ff4ffa178ac4999670000c33c2b0b57a688b94ec1410d9e331212
Size
715KB
MD5
7bc4f49f1611b5bdf24c84d61dabe9ac
SHA1
3af7533c3bce1fb1052cc161ab9c4e23e1aca96f
SHA256
2de04e13336ff4ffa178ac4999670000c33c2b0b57a688b94ec1410d9e331212
SHA512
f0771fcd3ee2336e00d308230d0e2bb04fb01c35dfe63c254730ed7aef9df366a0535c8160f05cfb6f4ce3a775a49e2a9db543d282c3afb854436ae0def0766c
SSDEEP
12288:wyxBE9kQswwWmcYiXhso2hU693d08a2a9ltHvCCqShXXr9:hHE9TpmDo2JllalhHvhqq
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
VirtualProtect
SetLastError
VirtualFree
WriteFile
VirtualAlloc
InitializeCriticalSectionEx
WaitForSingleObject
GetCurrentDirectoryA
GetModuleHandleA
MultiByteToWideChar
Sleep
GetTickCount64
CopyFileA
GetLastError
CreateFileA
GetCurrentThread
CloseHandle
K32GetModuleInformation
CreateThread
AddVectoredExceptionHandler
GetProcAddress
CreateFileMappingA
DeleteCriticalSection
ExitProcess
FreeLibrary
CreateDirectoryA
MapViewOfFile
FlsAlloc
CreateFileW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapQueryInformation
HeapReAlloc
LCMapStringW
IsDebuggerPresent
OutputDebugStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
LocalFree
GetCurrentProcess
GetCurrentThreadId
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualQuery
VirtualProtectEx
VirtualQueryEx
GetModuleHandleW
LoadLibraryExW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
HeapAlloc
HeapFree
GetProcessHeap
RtlUnwindEx
RtlPcToFileHeader
GetModuleFileNameW
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
RtlUnwind
QueryPerformanceFrequency
GetModuleHandleExW
GetSystemInfo
HeapSize
HeapValidate
GetStdHandle
GetCommandLineA
GetCommandLineW
GetFileType
WriteConsoleW
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
MessageBoxA
GetForegroundWindow
CoCreateInstance
CoUninitialize
CoInitialize
SysFreeString
VariantClear
SysAllocString
VariantInit
send
inet_addr
htonl
listen
accept
recv
bind
htons
WSAStartup
socket
closesocket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ