Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_2127ce0bedbf8b4ca87e4dd9ff1da3ee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_2127ce0bedbf8b4ca87e4dd9ff1da3ee.exe
Resource
win10v2004-20231215-en
Target
VirusShare_2127ce0bedbf8b4ca87e4dd9ff1da3ee
Size
4.8MB
MD5
2127ce0bedbf8b4ca87e4dd9ff1da3ee
SHA1
7b70ac1520a0a99962126292bca7fd7969e8768c
SHA256
e9bd669a8ff780b21f1cc4e9bb2af7e01e23965673847704be6a3aee397b9e89
SHA512
d091362cbadbeef114b52a284a410a5cf3f89012dba2754ab3b049336f000b1e9cc5d1928514ff865dc039228ccb9a488161bb74a0e59bf10988ba9bd6691915
SSDEEP
98304:kgXgevTgp5+6TwbEBIqGKd+l7vk+3vUkaWR6u/9vbRjToD9aFpwd0lh1bZsnZeuH:kgXgevTg/+2wOIXK+N3vkuT9jRXoD0AD
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
CreateThread
WaitForSingleObject
SetEvent
ResetEvent
WaitForMultipleObjects
CompareStringA
GetLastError
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
lstrlenA
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
GetModuleFileNameW
FormatMessageA
LocalFree
FormatMessageW
SetFileAttributesA
RemoveDirectoryA
SetCurrentDirectoryA
GetWindowsDirectoryA
SetFileAttributesW
RemoveDirectoryW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
GetShortPathNameW
GetShortPathNameA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
GetTempPathA
GetTempFileNameA
FindClose
FindFirstFileA
SetLastError
FindFirstFileW
FindNextFileA
CreateFileA
CreateFileW
GetFileSize
SetFilePointer
ReadFile
SetFileTime
WriteFile
SetEndOfFile
CreateEventA
EnterCriticalSection
LeaveCriticalSection
Sleep
GetCommandLineW
CreateProcessA
GetExitCodeProcess
IsBadReadPtr
SetUnhandledExceptionFilter
RaiseException
GetSystemInfo
VirtualProtect
GetLocaleInfoA
IsBadCodePtr
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCPInfo
GetOEMCP
GetACP
VirtualQuery
InterlockedExchange
RtlUnwind
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
TlsAlloc
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
HeapSize
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
HeapReAlloc
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
PostMessageA
ShowWindow
DestroyWindow
KillTimer
SetTimer
SetDlgItemTextA
EndDialog
IsDlgButtonChecked
GetDlgItem
MessageBoxW
DialogBoxParamA
GetDesktopWindow
SetForegroundWindow
GetWindowLongA
SetWindowLongA
SetWindowTextW
GetWindowTextA
GetWindowTextLengthA
SetWindowTextA
SendMessageA
LoadStringW
LoadStringA
CharPrevA
VariantClear
SysAllocString
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ