Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
am_delta_918ce329ce3123ec4412b81a92ac32a62bc60961.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
am_delta_918ce329ce3123ec4412b81a92ac32a62bc60961.exe
Resource
win10-20231020-en
Behavioral task
behavioral3
Sample
am_delta_918ce329ce3123ec4412b81a92ac32a62bc60961.exe
Resource
win10v2004-20231023-en
Target
am_delta_918ce329ce3123ec4412b81a92ac32a62bc60961.exe
Size
641KB
MD5
75a740202f462d8b2f987962eb52cce9
SHA1
918ce329ce3123ec4412b81a92ac32a62bc60961
SHA256
8356c74e924c438dcb9c1112e3e210928ba5ce222b173f0c4a1a29477e8cfed9
SHA512
1eaf84d2c1941adf2a8eef717ea5c7e7a2c8329f80f5d0c1e23d8b1a46df94db247ee5456cfc2cea466d790a5c053d8221bda91789cd639bb04887ef1d9bd7c5
SSDEEP
12288:V1Pgk1C0bM7wzPa2u3HZ+T8EtSIeye06hJ9W1JFr:DP71CKM7wzVu3H8I0eC6tir
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
TraceMessage
EventWriteTransfer
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCloseKey
EventUnregister
EventRegister
OpenThreadToken
OpenProcessToken
GetLengthSid
CheckTokenMembership
FreeSid
CopySid
AllocateAndInitializeSid
CloseHandle
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
SetLastError
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetCurrentThread
GetCurrentThreadId
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
FreeLibrary
GetProcAddress
LoadLibraryExW
CompareStringW
LCMapStringW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
MultiByteToWideChar
ExitProcess
GetModuleHandleW
GetModuleHandleExW
GetProcessHeap
WideCharToMultiByte
HeapSize
HeapReAlloc
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
EncodePointer
RaiseException
InitializeCriticalSectionEx
CallNamedPipeW
InitializeProcThreadAttributeList
FindClose
CreateToolhelp32Snapshot
UpdateProcThreadAttribute
Process32NextW
Process32FirstW
DeleteProcThreadAttributeList
WaitNamedPipeW
VirtualQuery
FlushFileBuffers
GetProcessId
GetProcessTimes
GetCommandLineW
GetThreadTimes
GetModuleFileNameW
GetEnvironmentVariableW
GetSystemDirectoryW
HeapSetInformation
CreateProcessW
FindNextFileW
WriteFile
SetEnvironmentVariableW
WaitForSingleObject
CreateFileW
GetFileAttributesW
OpenProcess
CreateEventW
SetEvent
WaitForSingleObjectEx
ResetEvent
SetFilePointerEx
QueryFullProcessImageNameW
VirtualLock
GetStdHandle
GetCommandLineA
FindFirstFileExW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetConsoleOutputCP
GetConsoleMode
WriteConsoleW
DecodePointer
UuidCreate
RtlNtStatusToDosError
NtQueryInformationProcess
RtlGetVersion
RtlPcToFileHeader
RtlUnwindEx
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwind
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ