Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
6067e03cb170e6913fc0c9710d0d3cfb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6067e03cb170e6913fc0c9710d0d3cfb.exe
Resource
win10v2004-20231215-en
Target
6067e03cb170e6913fc0c9710d0d3cfb
Size
80KB
MD5
6067e03cb170e6913fc0c9710d0d3cfb
SHA1
450cb0a74499845337bd405b2ae53a77d52a1cf6
SHA256
8efb07ac00ea74496148781d1cf5a4f3f6ebab1f63418a877d50ce5bed708c20
SHA512
b239262d70f959e1e2f96d261ab9bc7ddad8ffcf99a125f757102e3c3dc310657e5d31439fc7a4f0adbda7e4e0658f84133c7bd671334af2a10851fb2ce9b099
SSDEEP
768:CUUQ95sGWDSw2FGwoDc9aXZQR5G4jRrgLHyC35MRq0oNicaHtrmrW:y65s1SBFcTyRcyCpb0oNirN+W
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FormatMessageA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
FreeResource
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentStringsW
GetExitCodeProcess
GetFileAttributesA
GetFileInformationByHandle
GetFileType
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetPrivateProfileIntA
GetPrivateProfileSectionA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
FlushFileBuffers
InterlockedExchange
IsDBCSLeadByte
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
LocalFree
LockResource
MapViewOfFile
MoveFileA
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
RtlUnwind
SetFileAttributesA
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteFile
WritePrivateProfileSectionA
WritePrivateProfileStringA
_lclose
_llseek
_lread
_lwrite
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
FindResourceExA
FindFirstFileA
FindClose
ExitProcess
EnumResourceTypesA
EnumResourceNamesA
EnumResourceLanguagesA
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateProcessA
CreateFileMappingA
CreateFileA
CreateDirectoryA
CopyFileA
InitializeCriticalSection
CloseHandle
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
PostMessageA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetFocus
SetWindowLongA
ShowWindow
wsprintfA
LoadCursorA
LoadIconA
MessageBeep
LoadStringA
IsDlgButtonChecked
GetWindowRect
GetWindowLongA
GetSystemMetrics
GetParent
GetDlgItemTextA
GetDlgItem
GetDC
EnableWindow
DispatchMessageA
CheckRadioButton
CheckDlgButton
CharPrevA
CharNextA
CallWindowProcA
GetStockObject
GetObjectA
GetDeviceCaps
CreateFontIndirectA
DeleteObject
GetSaveFileNameA
GetOpenFileNameA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CreatePropertySheetPageA
DestroyPropertySheetPage
PropertySheetA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ