Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_9c7e84113b329bea497d963db2ab8bf5.exe
Resource
win10v2004-20231215-en
Target
VirusShare_9c7e84113b329bea497d963db2ab8bf5
Size
169KB
MD5
9c7e84113b329bea497d963db2ab8bf5
SHA1
27bc2abc7816401130289e916a9c4224fbf1dc87
SHA256
ff23a9eca12dc9f585a201f12907bc04df670dc759277cfe402a3924a0e49adb
SHA512
0c098b40a9c268ac8f5b89ecbbaee59155c5b2ea7888eab22239f5fed111e406b900b9db02620a291f468624c0b3e6f1a17d11969d6310a7fa925feca08a94b0
SSDEEP
3072:8LbjKmmfcRygt+sX4LdVZtJ6rrRczBpb6K3yGHw6rI2Z+yAV1NiP1ry:8LPK/fcRVnIHZtSrRc9cMk6kfiry
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ReadFile
LoadLibraryA
GetProcAddress
GetWindowsDirectoryW
lstrcatW
CreateFileW
GetCommProperties
SetHandleCount
SetThreadExecutionState
IsBadWritePtr
EraseTape
GetConsoleAliasExesW
IsBadReadPtr
GetDiskFreeSpaceW
CreateJobObjectW
lstrcpyA
UnlockFile
SetConsoleActiveScreenBuffer
ScrollConsoleScreenBufferW
GlobalMemoryStatus
SetHandleInformation
BuildCommDCBAndTimeoutsW
SizeofResource
Module32FirstW
SetConsoleCursorInfo
HeapFree
GetHandleInformation
PurgeComm
CreateMutexA
GetPrivateProfileStructW
LockFile
LCMapStringA
SetCalendarInfoW
CancelDeviceWakeupRequest
MoveFileWithProgressW
WritePrivateProfileSectionW
GlobalAddAtomA
BackupRead
GlobalDeleteAtom
AssignProcessToJobObject
GetConsoleAliasesLengthA
FoldStringW
FreeLibraryAndExitThread
GetSystemPowerStatus
GetOEMCP
GetCurrentThread
BuildCommDCBAndTimeoutsA
PeekNamedPipe
IsBadStringPtrA
GenerateConsoleCtrlEvent
GetThreadLocale
GetDriveTypeW
SetFileAttributesW
ReadProcessMemory
EndUpdateResourceA
SetCommBreak
GetTempPathA
ClearCommError
GetComputerNameW
SetConsoleTitleA
WriteProfileStringW
SetFilePointerEx
InterlockedCompareExchange
GlobalGetAtomNameA
lstrlenA
OutputDebugStringA
Heap32First
GetCurrentDirectoryW
GlobalAlloc
GetNumberOfConsoleMouseButtons
ReadConsoleOutputA
OpenProcess
GetSystemInfo
PeekConsoleInputA
SetVolumeMountPointA
GetTempFileNameW
SetProcessWorkingSetSize
GlobalHandle
GetLogicalDriveStringsA
SetDefaultCommConfigA
Process32Next
FindNextVolumeMountPointW
IsDebuggerPresent
AllocConsole
GetConsoleScreenBufferInfo
UnmapViewOfFile
Process32NextW
EnumSystemCodePagesA
GetCommandLineA
GetLogicalDriveStringsW
WritePrivateProfileStructW
GetPrivateProfileStringW
GetVolumePathNameW
FindCloseChangeNotification
CreateEventA
GetConsoleTitleW
SetClassLongA
PostQuitMessage
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
LoadIconA
LoadCursorA
RegisterClassExA
CreateDialogParamA
GetWindowTextLengthA
ToAscii
SetWinEventHook
ScrollWindowEx
mouse_event
IsCharLowerW
LoadCursorFromFileW
SetDeskWallpaper
GetClipboardSequenceNumber
OpenIcon
ChangeMenuA
GetKeyboardLayoutList
GetMenuDefaultItem
IsWindowEnabled
UnhookWindowsHook
DrawEdge
FindWindowExW
TrackPopupMenu
MonitorFromRect
IsRectEmpty
DdeQueryStringA
EnumDisplaySettingsW
IMPSetIMEW
GetSystemMenu
ShowCursor
GetWindowPlacement
CreateIconIndirect
GetClipboardViewer
GetUserObjectSecurity
SetWindowsHookW
GetQueueStatus
MessageBoxIndirectA
EnumThreadWindows
GetWindowTextLengthW
LoadMenuIndirectA
CheckDlgButton
GetWindowRect
GetCursor
EnableMenuItem
InvertRect
EnumDesktopsW
WaitMessage
ScrollDC
EnumPropsA
ChangeMenuW
GetForegroundWindow
DdeFreeStringHandle
GetSysColorBrush
AllowSetForegroundWindow
AppendMenuA
CopyImage
GetUserObjectInformationA
FindWindowW
GetKeyboardLayout
OpenDesktopA
CreateDialogIndirectParamW
OemKeyScan
ChildWindowFromPoint
GetCursorInfo
CreateCursor
GetWindowRgn
GetShellWindow
EnumWindows
RegisterDeviceNotificationA
GetMessagePos
SetProcessWindowStation
GetClassLongW
IMPGetIMEW
WaitForInputIdle
ShowOwnedPopups
GetInputState
GetGuiResources
CascadeWindows
RegisterShellHookWindow
GetTitleBarInfo
SetShellWindow
SetSysColors
GetIconInfo
EndDeferWindowPos
LoadStringW
UpdateLayeredWindow
CharLowerBuffW
GetClipboardFormatNameA
ChildWindowFromPointEx
CharPrevExA
GetNextDlgTabItem
SystemParametersInfoA
GetStockObject
DeleteObject
CreateSolidBrush
memset
RegOpenKeyExW
DragQueryFile
FindExecutableA
SHFreeNameMappings
DuplicateIcon
ExtractIconExW
SHGetDataFromIDListA
SHGetDesktopFolder
DoEnvironmentSubstW
SHInvokePrinterCommandW
SHLoadInProc
SHGetPathFromIDListA
SHGetDiskFreeSpaceExW
SHQueryRecycleBinW
ShellHookProc
WOWShellExecute
ShellAboutW
SHGetFileInfoA
SHEmptyRecycleBinA
Shell_NotifyIconW
ShellExecuteW
ExtractAssociatedIconExW
SHFileOperationA
SHGetInstanceExplorer
SHGetFolderPathW
SHGetIconOverlayIndexW
SHFormatDrive
SHGetFolderLocation
ShellExecuteExW
SHIsFileAvailableOffline
SHLoadNonloadedIconOverlayIdentifiers
SHCreateDirectoryExW
DragQueryFileW
SHPathPrepareForWriteA
SHGetSpecialFolderPathW
ExtractAssociatedIconExA
SHGetPathFromIDList
SHChangeNotify
SHAddToRecentDocs
SHGetFileInfo
SHGetSpecialFolderLocation
SHBrowseForFolderW
ExtractIconEx
SHBrowseForFolder
ShellExecuteA
ExtractIconExA
SHCreateProcessAsUserW
SHGetIconOverlayIndexA
SHQueryRecycleBinA
Shell_NotifyIcon
ShellExecuteEx
SHAppBarMessage
SHBrowseForFolderA
SHEmptyRecycleBinW
StrCmpNIW
StrRChrIW
StrChrW
StrCmpNA
StrCmpNIA
StrChrIA
StrRChrA
StrRChrIA
StrRChrW
StrStrIA
StrRStrIA
StrChrA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ