Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
OpenWith.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
OpenWith.exe
Resource
win10v2004-20230220-en
Target
OpenWith.exe
Size
103KB
MD5
10649c82758e8077301c841e9be67682
SHA1
35a7c7b384f58f85d1bbb4d1633109fd7a6c7475
SHA256
816d4ed8ae7dca43fca0f7b67d470826a6e71692f917598606a7eec2e29480ea
SHA512
c3047dee6e7acb52cb7558db2eb664b164780dad16464cd3c741c6a771f27972be7679c29b2379e779884f10b6214e512c92f2e09243f3921a5aa7e6d1f6faca
SSDEEP
1536:Unngg6IKnOsW6t0BR2J50aimCCNrirKyPFYyfKQTzBNer+CE+Ge+iUZWPm:YuIL6t0BRSir3Wmrer+CE+G0Uw
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
HeapFree
SetLastError
ReleaseSemaphore
GetModuleHandleExW
WaitForSingleObject
GetCurrentThreadId
ReleaseMutex
FormatMessageW
GetLastError
OutputDebugStringW
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
HeapAlloc
GetProcAddress
CreateMutexExW
GetCurrentProcessId
GetProcessHeap
CreateSemaphoreExW
DebugBreak
IsDebuggerPresent
LocalFree
CompareStringOrdinal
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
AcquireSRWLockShared
ReleaseSRWLockShared
SetThreadpoolTimer
CreateThreadpoolTimer
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionEx
InitOnceBeginInitialize
InitOnceComplete
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
GetModuleHandleW
DelayLoadFailureHook
ResolveDelayLoadedAPI
GetModuleFileNameA
KillTimer
PostQuitMessage
SetTimer
PostThreadMessageW
CreatePopupMenu
GetMenuDefaultItem
DestroyMenu
ord2521
DispatchMessageW
GetMessageW
TranslateMessage
memset
_callnewh
memcmp
__set_app_type
__wgetmainargs
exit
_exit
_cexit
__p__fmode
__setusermatherr
_initterm
_wcmdln
_lock
_unlock
__dllonexit
_onexit
_amsg_exit
__p__commode
_XcptFilter
free
memmove_s
_purecall
_vsnprintf_s
memcpy_s
_vsnwprintf
__CxxFrameHandler3
?terminate@@YAXXZ
_controlfp
_except_handler4_common
malloc
SetProcessReference
SHSetThreadRef
IUnknown_Set
IUnknown_QueryService
IUnknown_GetSite
IUnknown_SetSite
SHStrDupA
SHCreateThreadRef
ord764
PathIsURLW
ord172
ord219
CoCreateInstance
CoRegisterClassObject
CoRevokeClassObject
CoInitializeEx
CoUninitialize
CoCopyProxy
CoSetProxyBlanket
CoTaskMemAlloc
CoGetMalloc
CoTaskMemFree
CoGetCallContext
Sleep
GetCurrentProcess
GetStartupInfoW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
LocalAlloc
ord236
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ