Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
7f2a197f45fa04029ab8da23ea2a5931.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f2a197f45fa04029ab8da23ea2a5931.exe
Resource
win10v2004-20231215-en
Target
7f2a197f45fa04029ab8da23ea2a5931
Size
1.1MB
MD5
7f2a197f45fa04029ab8da23ea2a5931
SHA1
6ff1e7cc06beb6a703f5239b3dd4288ae00eb1b7
SHA256
12b5ceacdbfe573ca70763838a3025f0460969204ffec34deb85e5d4a65ba5cb
SHA512
0da39847f60647fbffd1523576a28f6b499dbbb70f99f089bfb48389dfc3ad70aa554633b3416abed37293716ca870d68287f96c94cd19db5f615dea9a928f4b
SSDEEP
24576:D99fMLQ6gSy8Q7BiNL+VElHA1dHdQ0aKMrzws1Ztf3vG:59EUOQdiNiElHAbdoKUwsVf3vG
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\evil\SVN\Exe\projects\arcadeyum\bin\module.runner.pdb
ResetEvent
WaitForSingleObject
Sleep
LoadResource
SizeofResource
CloseHandle
GetTickCount
CreateMutexA
OpenMutexA
CreateEventA
FindResourceA
CreateDirectoryA
RemoveDirectoryA
DeleteFileA
FindFirstFileA
SetEvent
MoveFileExA
GetVersionExA
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
InitializeCriticalSectionAndSpinCount
lstrlenA
CreateFileW
WriteConsoleW
FlushFileBuffers
SetStdHandle
GetStringTypeW
HeapReAlloc
SetLastError
GetLastError
GetCurrentProcess
OpenProcess
LockResource
FreeResource
GetComputerNameA
FindNextFileA
GetVolumeInformationA
LCMapStringW
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetProcessHeap
GetConsoleCP
WideCharToMultiByte
DeleteCriticalSection
SetEndOfFile
GetFileType
EncodePointer
DecodePointer
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
ReadFile
GetCommandLineA
GetStdHandle
WriteFile
GetModuleFileNameW
HeapAlloc
HeapFree
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
HeapSize
InterlockedIncrement
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetConsoleMode
ReadConsoleW
SetFilePointer
SetFilePointerEx
MessageBoxA
CreateWindowExA
RegisterClassExA
GetMessageA
PostQuitMessage
TranslateMessage
DispatchMessageA
DefWindowProcA
AllocateAndInitializeSid
EqualSid
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegOpenKeyA
RegCloseKey
FreeSid
ord680
ShellExecuteExA
SHGetFolderPathA
CoUninitialize
CoCreateInstance
CoInitialize
VariantInit
VariantClear
SysAllocString
ord176
wnsprintfA
WinHttpReceiveResponse
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpOpenRequest
WinHttpSendRequest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ