Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
434286c2ab0c6e750cb6a3f2676300c3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
434286c2ab0c6e750cb6a3f2676300c3.exe
Resource
win10v2004-20231215-en
Target
434286c2ab0c6e750cb6a3f2676300c3
Size
118KB
MD5
434286c2ab0c6e750cb6a3f2676300c3
SHA1
4438ef3d6ac2c921af880a0c0ccdc3fc689c64be
SHA256
37294f893deb33f2d5e08b719cc07fcfad3ebcb7138dc76a4329617a53516fff
SHA512
d220dbff80c5d4681ee5d16bb546c831dfc0574cf44e30cb872edb573cc30c1e3dcb8054bbbda236276369cc4be3a9dea29492f2a14dd1d1605bea54751fc6ca
SSDEEP
1536:+qM9UqVfxeUwxi5s/SxN/AbdonWR5FX9BbikbPExSu/MNQfSr71xLpsxBQy:+qM9UqTe9asaxN2LXjbikbwf2nbwBQ
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetConsoleAliasA
GetConsoleAliasesLengthA
GetConsoleFontSize
GetCurrentProcess
GetDateFormatA
GetDateFormatW
GetDefaultCommConfigW
GetExitCodeProcess
GetFileTime
GetLargestConsoleWindowSize
GetLastError
GetLongPathNameW
GetPrivateProfileIntA
GetPrivateProfileSectionA
GetPrivateProfileStructA
GetProcessHeap
GetProcessHeaps
GetProfileIntW
GetQueuedCompletionStatus
GetShortPathNameW
GetStartupInfoA
GetSystemDefaultUILanguage
GetSystemDirectoryW
GetTimeFormatA
GetVersion
GlobalAlloc
GlobalFindAtomW
HeapCreate
IsBadHugeWritePtr
LoadLibraryExW
LockFile
MapUserPhysicalPages
MapViewOfFile
MoveFileA
MoveFileExA
MoveFileWithProgressW
OpenMutexA
GetCalendarInfoA
FreeEnvironmentStringsA
OutputDebugStringA
PeekConsoleInputA
Process32First
Process32FirstW
QueryPerformanceFrequency
QueueUserWorkItem
ReadConsoleInputA
ReadConsoleOutputA
ReadConsoleOutputCharacterW
RtlUnwind
ScrollConsoleScreenBufferA
SetCommTimeouts
SetComputerNameW
SetConsoleMode
SetEnvironmentVariableW
SetFileApisToANSI
SetFileApisToOEM
SetFilePointerEx
SetLocaleInfoA
SetWaitableTimer
SystemTimeToTzSpecificLocalTime
TerminateJobObject
TryEnterCriticalSection
UpdateResourceW
VerLanguageNameA
VirtualAllocEx
VirtualLock
VirtualQueryEx
WaitForDebugEvent
WideCharToMultiByte
WriteConsoleA
WriteFileGather
_lopen
lstrcat
lstrcmp
lstrcmpiA
OpenProcess
GetACP
FormatMessageA
VirtualAlloc
FillConsoleOutputCharacterW
FileTimeToSystemTime
ExitThread
EscapeCommFunction
DosDateTimeToFileTime
DeviceIoControl
DeleteFileW
DebugActiveProcess
CreateTimerQueueTimer
CreateThread
CreateProcessW
CreatePipe
CreateMutexA
CreateEventA
CallNamedPipeW
BackupRead
AddAtomA
LoadLibraryW
GetProcAddress
LoadLibraryA
ExitProcess
OpenSemaphoreW
GetStockObject
ReplaceTextW
ReplaceTextA
PrintDlgW
PrintDlgExW
PrintDlgExA
PrintDlgA
PageSetupDlgW
PageSetupDlgA
GetSaveFileNameW
GetSaveFileNameA
GetOpenFileNameW
GetOpenFileNameA
GetFileTitleW
GetFileTitleA
FindTextW
FindTextA
CommDlgExtendedError
ChooseFontW
ChooseFontA
ChooseColorA
ChooseColorW
RegOpenKeyExW
AssocQueryKeyW
AssocQueryStringA
ChrCmpIA
PathAddExtensionW
PathAppendA
PathBuildRootW
PathCommonPrefixA
PathCommonPrefixW
PathCompactPathExA
PathFindFileNameW
PathGetCharTypeW
PathGetDriveNumberW
PathIsFileSpecA
PathIsFileSpecW
PathIsLFNFileSpecA
PathIsRootW
PathIsSameRootA
PathIsSystemFolderW
PathIsUNCServerW
PathMakePrettyA
PathMatchSpecA
PathParseIconLocationA
PathQuoteSpacesA
PathRelativePathToA
PathRemoveArgsW
PathRemoveExtensionW
PathRenameExtensionA
PathSearchAndQualifyA
PathSetDlgItemPathW
PathSkipRootA
PathStripToRootA
PathStripToRootW
PathUnExpandEnvStringsW
PathUndecorateA
PathUnmakeSystemFolderA
PathUnmakeSystemFolderW
SHCopyKeyA
ord16
SHDeleteEmptyKeyA
SHDeleteKeyW
SHDeleteValueA
SHEnumKeyExA
SHGetInverseCMAP
SHGetValueA
SHOpenRegStream2A
SHQueryInfoKeyW
SHRegCloseUSKey
SHRegDuplicateHKey
SHRegEnumUSKeyW
SHRegEnumUSValueW
SHRegGetBoolUSValueW
SHRegGetUSValueA
SHRegOpenUSKeyA
SHRegOpenUSKeyW
SHRegSetPathA
SHRegSetPathW
SHStrDupW
StrCSpnIW
StrChrIW
StrCmpIW
StrCmpNIA
StrCpyNW
StrCpyW
StrFormatKBSizeA
StrNCatW
StrPBrkW
StrRChrW
StrSpnA
StrSpnW
StrStrIW
StrToIntA
StrTrimW
UrlCanonicalizeW
UrlCompareA
UrlCreateFromPathA
UrlGetPartA
UrlHashW
UrlIsNoHistoryW
UrlIsOpaqueW
wnsprintfW
wvnsprintfA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ