Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
6833c8a7673c107ec945c237c0dd05aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6833c8a7673c107ec945c237c0dd05aa.exe
Resource
win10v2004-20231222-en
Target
6833c8a7673c107ec945c237c0dd05aa
Size
234KB
MD5
6833c8a7673c107ec945c237c0dd05aa
SHA1
33a226d3f85bb8bf4d0af4bebbd5a37a64c2e47d
SHA256
70711830a3d144285ad8c07a81e197997dba9df8ad9d5474eb0aede3e19e3cf7
SHA512
b518f709f15cfd9638b95d1420cd111455c2612350a322075e86d59d0a16eabaa3da370ad901ba8c260f36932cba92f0f6679f98479b9c7effb3a4ded77d1ca2
SSDEEP
6144:/Uw60wkaM3QpLsn9T1j0g7r2QakBWaQg4Vx5:sewkZ+Lsn9tyeYhx5
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
WriteFile
Sleep
SizeofResource
SetEndOfFile
OpenMutexA
LockResource
LoadResource
LoadLibraryA
GetSystemTime
GetProcAddress
GetCurrentProcess
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
DeleteFileA
CreateProcessA
CreateMutexA
CreateFileA
CloseHandle
VirtualProtect
GetModuleFileNameA
ExitProcess
GetKeyboardType
MessageBoxA
CharNextA
PostMessageA
MessageBoxA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegSaveKeyA
RegRestoreKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ