Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
d41c4a7f54719020ce0acecea24d0e50c45d9bb609edc2bb4c4cc9d6444e8466.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d41c4a7f54719020ce0acecea24d0e50c45d9bb609edc2bb4c4cc9d6444e8466.exe
Resource
win10v2004-20230220-en
Target
d41c4a7f54719020ce0acecea24d0e50c45d9bb609edc2bb4c4cc9d6444e8466
Size
714KB
MD5
a1c944115b2d9d2d1974d88fad38de3e
SHA1
cfeefe53a666df0b0b40abdef892c87c56d69160
SHA256
d41c4a7f54719020ce0acecea24d0e50c45d9bb609edc2bb4c4cc9d6444e8466
SHA512
584a72c28e716fd02764b9d9049ea81fed38d007d4abfd27085b9e4d93d06abb74ef9549c33e39124da8712d921811cdf5ae1819a5899699b2646d45461c1397
SSDEEP
12288:qK7RvWhKoPQ1iXh/bX1IZHWX8a2a9ltHvCCqShXXx9:TVvuPQSD1IJalhHvhq4
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
VirtualProtect
SetLastError
VirtualFree
WriteFile
VirtualAlloc
InitializeCriticalSectionEx
WaitForSingleObject
GetCurrentDirectoryA
GetModuleHandleA
MultiByteToWideChar
Sleep
GetTickCount64
CopyFileA
GetLastError
CreateFileA
GetCurrentThread
CloseHandle
K32GetModuleInformation
CreateThread
AddVectoredExceptionHandler
GetProcAddress
CreateFileMappingA
DeleteCriticalSection
ExitProcess
FreeLibrary
CreateDirectoryA
MapViewOfFile
FlsAlloc
CreateFileW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapQueryInformation
HeapReAlloc
LCMapStringW
IsDebuggerPresent
OutputDebugStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
LocalFree
GetCurrentProcess
GetCurrentThreadId
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualQuery
VirtualProtectEx
VirtualQueryEx
GetModuleHandleW
LoadLibraryExW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
HeapAlloc
HeapFree
GetProcessHeap
RtlUnwindEx
RtlPcToFileHeader
GetModuleFileNameW
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
RtlUnwind
QueryPerformanceFrequency
GetModuleHandleExW
GetSystemInfo
HeapSize
HeapValidate
GetStdHandle
GetCommandLineA
GetCommandLineW
GetFileType
WriteConsoleW
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
MessageBoxA
GetForegroundWindow
CoCreateInstance
CoUninitialize
CoInitialize
SysFreeString
VariantClear
SysAllocString
VariantInit
send
inet_addr
htonl
listen
accept
recv
bind
htons
WSAStartup
socket
closesocket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ