Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
9269.exe
Resource
win10v2004-20231023-en
Target
9269.exe.vir
Size
1.4MB
MD5
711d8682ec215e6ec5fdbf6acc10240e
SHA1
1786859b2ac480ff5698fad981aec52873b9f21a
SHA256
b245325d21b53f21ee7d6a1a8ed3963fcb89cf9770c3d0476ca0544558eaabc3
SHA512
77b68a54d52b03df21514200b6f34f68b3273e8024f4e528003ea4093fd7f4d3a099962a59283def4e4eadfd7f47eb7c4d798b9215e91f5c2178f66c952083e0
SSDEEP
24576:hXNLeml1gXxVn/r5zmscdv5mQ5UOBrI5fTveb/Jz28wXTJvdx:hXZeml1gXxl5z+LmQvaDebRz28wXTzx
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
GlobalUnlock
GlobalLock
GlobalAlloc
GetCurrentProcessId
GetProcAddress
LoadLibraryW
GetCommandLineA
GetCurrentDirectoryA
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
TryEnterCriticalSection
lstrcmpA
GetCurrentThreadId
GetTickCount
lstrcmpiA
DeleteCriticalSection
Sleep
InitializeCriticalSection
LeaveCriticalSection
OutputDebugStringA
EnterCriticalSection
CreateEventA
ResetEvent
CreateThread
WaitForSingleObject
SetEvent
LocalFree
EncodePointer
DecodePointer
InitializeCriticalSectionEx
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
QueryPerformanceCounter
GetSystemTimeAsFileTime
WriteFile
CreateFileW
GetLastError
lstrcmpiW
SizeofResource
GetFullPathNameW
ReleaseSemaphore
CreateMutexW
ReleaseMutex
OpenFileMappingW
ResumeThread
UnmapViewOfFile
CreateEventW
LockResource
FindResourceExW
LoadResource
CreateSemaphoreW
CreateFileMappingW
MapViewOfFile
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
HeapDestroy
RaiseException
CloseHandle
WaitForMultipleObjects
PolyPolygon
CreateHatchBrush
Polygon
GetTextMetricsA
CreateFontA
TextOutW
TextOutA
SetTextAlign
BitBlt
CreateDIBSection
CreateCompatibleDC
GetTextExtentExPointA
Rectangle
Pie
Ellipse
GetTextExtentPoint32A
PatBlt
CreateRectRgn
LineTo
CreateFontIndirectA
MoveToEx
SelectObject
CreateBrushIndirect
SetBkColor
SetDCPenColor
CreateSolidBrush
DeleteObject
SetBkMode
CreatePen
GetStockObject
SwitchToThisWindow
GetWindowInfo
TranslateAcceleratorA
GetSubMenu
DialogBoxParamA
MessageBeep
EndDialog
LoadStringA
MessageBoxW
GetMenu
GetMessageA
LoadMenuA
GetWindowDC
SetWindowLongPtrA
GetWindowLongPtrA
SetClipboardData
GetMonitorInfoA
EmptyClipboard
CloseClipboard
OpenClipboard
GetSystemMetrics
MonitorFromWindow
UnregisterClassA
ModifyMenuA
SendMessageW
SetScrollInfo
GetKeyState
GetWindowRect
GetDC
SetWindowPos
FillRect
ScreenToClient
GetScrollInfo
RedrawWindow
GetDlgCtrlID
ClientToScreen
RegisterClassA
SetDlgItemTextW
GetDlgItemTextW
MessageBoxA
GetSysColor
MoveWindow
IsDlgButtonChecked
DefWindowProcA
CreateWindowExA
ScrollWindowEx
GetDlgItemInt
GetClientRect
InvalidateRect
ReleaseDC
BeginPaint
EndPaint
CallNextHookEx
GetDlgItemTextA
SetWindowsHookExA
UnhookWindowsHookEx
SetDlgItemTextA
GetDlgItem
EnableWindow
LoadCursorA
PostMessageA
SendMessageA
SetCursor
CheckDlgButton
SetDlgItemInt
DispatchMessageA
DestroyWindow
MsgWaitForMultipleObjects
ShowWindow
IsWindow
IsDialogMessageA
GetWindowTextA
SetWindowTextA
TranslateMessage
DestroyMenu
DrawMenuBar
CreateDialogParamA
PeekMessageA
LoadAcceleratorsA
SetScrollRange
LoadIconA
TrackPopupMenuEx
RemoveMenu
CheckMenuItem
PostQuitMessage
SetScrollPos
EnableMenuItem
InsertMenuItemA
UpdateWindow
RegisterClassExA
IsCharAlphaNumericW
GetCursorPos
SetForegroundWindow
SetFocus
__crtLCMapStringA
_wsetlocale
_XcptFilter
_amsg_exit
__getmainargs
__set_app_type
exit
_exit
_cexit
__setusermatherr
_initterm
__C_specific_handler
_acmdln
_fmode
_commode
__dllonexit
_onexit
?terminate@@YAXXZ
??1type_info@@UEAA@XZ
_wcsdup
memset
??3@YAXPEAX@Z
__CxxFrameHandler3
_purecall
swprintf_s
abort
_ismbblead
___mb_cur_max_func
__uncaught_exception
islower
calloc
___lc_codepage_func
___lc_handle_func
isupper
__pctype_func
fseek
_fsopen
setlocale
_unlock
_lock
memmove
memcpy
_CxxThrowException
_callnewh
malloc
_i64toa_s
localeconv
strcspn
sprintf_s
wcsrchr
strstr
_wcsupr_s
wcsstr
wcscat_s
mbstowcs
sscanf_s
_strtoui64
wcstombs
swscanf_s
strtod
_strtoi64
_vsnwprintf
vsprintf_s
_wcsicmp
_fseeki64
fsetpos
ungetc
free
fgetpos
fwrite
??0exception@@QEAA@AEBQEBD@Z
fgetc
_vsnprintf
fclose
_wtoi
vswprintf_s
_vscwprintf
_wcslwr_s
memmove_s
fflush
memcpy_s
fputc
??0bad_cast@@QEAA@AEBV0@@Z
??0bad_cast@@QEAA@PEBD@Z
??1bad_cast@@UEAA@XZ
??_V@YAXPEAX@Z
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBDH@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
_scwprintf
setvbuf
GetSaveFileNameA
GetOpenFileNameW
GradientFill
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SysFreeString
SysAllocString
ShellExecuteA
ord17
UuidFromStringA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ