Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2cf3b3bd4a47001a0aaf9536a90dea3e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cf3b3bd4a47001a0aaf9536a90dea3e.exe
Resource
win10v2004-20231215-en
Target
2cf3b3bd4a47001a0aaf9536a90dea3e
Size
323KB
MD5
2cf3b3bd4a47001a0aaf9536a90dea3e
SHA1
78f569222efce768b418e27a8713d020f0c51331
SHA256
a830c6750f5b982405f8de5484797ce8db71d5e06b62209218b184e0f77c00a4
SHA512
36edc6fcae9a1d199263aa6d87fb94e747e453899435e2bdc5f63194a09ee731d0d54c3f1d73f0a771ef4c8877fd3cd361ca0dffbad87237832d36eca5030ce3
SSDEEP
6144:bNurYZTSDk36Kszjb8C1q246zlODFVRv5:bN+YZGDO6v1sxz5
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateThread
DebugBreak
DeleteFileA
DeviceIoControl
EnterCriticalSection
ExitProcess
ExitThread
ExpandEnvironmentStringsA
FileTimeToDosDateTime
FileTimeToLocalFileTime
FormatMessageA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetModuleFileNameA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
CreateFileMappingA
IsDBCSLeadByte
LoadLibraryExA
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
OpenProcess
QueryPerformanceCounter
ReadFile
SetCommTimeouts
SetCurrentDirectoryA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForMultipleObjects
WideCharToMultiByte
lstrcpynA
lstrlenW
CloseHandle
GetSystemDirectoryA
lstrcatA
CreateFileA
GetTickCount
VirtualAllocEx
SetClipboardViewer
SendMessageA
InvalidateRect
BeginPaint
GetClientRect
DefWindowProcA
GetDeviceCaps
AddFontResourceA
CreateFontIndirectA
RegOpenKeyExW
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE