Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_4c827b8b3e18a5285cf89625fc6e16fd.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_4c827b8b3e18a5285cf89625fc6e16fd.dll
Resource
win10v2004-20231215-en
Target
VirusShare_4c827b8b3e18a5285cf89625fc6e16fd
Size
255KB
MD5
4c827b8b3e18a5285cf89625fc6e16fd
SHA1
7d34232e6699e2ca987ff5bc6a0ee5825e64bee4
SHA256
24ec47762b2543d844c6f9079fdb6bf5b79518ffb70815bda558d4388637afee
SHA512
dbac0405a98351470cffcad0d93a0ddb01266453701a1406f82bd491de6d626644b96dc20c9073fededf4e28cb530e3a604c8d91d7cd9ad2a8eed7702b8fa0c1
SSDEEP
3072:yuQZfWYSQSO46Btva7+gHWRYqsALbfuGz1jZlwTiBi6etzs1xNzo:Xub46rvw+uWRDbfl1jZqiBi6q
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAlloc
ReadFile
GetCommandLineW
GetStockObject
RegOpenKeyA
__dllonexit
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
_adjust_fdiv
_controlfp
_initterm
_onexit
_wcmdln
_wfopen
exit
wcstok
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ