Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_a376bf1104af61ba7731ddb593fa90ae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_a376bf1104af61ba7731ddb593fa90ae.exe
Resource
win10v2004-20231215-en
Target
VirusShare_a376bf1104af61ba7731ddb593fa90ae
Size
84KB
MD5
a376bf1104af61ba7731ddb593fa90ae
SHA1
aea6cb220b7379bc4b7c5cb83997218ab7144eaf
SHA256
3e52adad6574bafcf25de3cb9967e2e9a1545898e9ba686fc449e4fe7ffa432f
SHA512
2f059e2574e301532bd39d9d1daeac568790bbaca690b9e514b9319befa3f08782cfc9a7970e0df79cc986992983504479c346ba3a525bbe7f6b2ab4403d1689
SSDEEP
768:/KrqgHN13edH4eSROPPt8i0lLOFPFMFMFiIFQp44fX0:/2DN1ewUt8LQdGGtFQg
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetCommandLineW
VirtualAlloc
GetWindowsDirectoryW
lstrlenW
GetSystemWindowsDirectoryW
LocalFree
LocalAlloc
GetCurrentProcess
GetLastError
WaitForMultipleObjects
CreateThread
GetCurrentThreadId
OpenEventW
CreateEventW
SetEvent
CreateMutexW
SetLastError
lstrcmpW
GetVersionExW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoA
lstrcatW
GetNumberFormatW
lstrcpyW
LoadLibraryA
CreateHardLinkA
VirtualQueryEx
GetCurrencyFormatA
FindFirstVolumeW
CreateFileMappingW
SetConsoleDisplayMode
IsSystemResumeAutomatic
Process32NextW
GetTapeStatus
_llseek
ReadConsoleInputA
lstrcpy
ReadFileEx
ExpandEnvironmentStringsW
DeleteVolumeMountPointW
UnlockFileEx
GetTempFileNameA
Module32First
FreeUserPhysicalPages
CopyFileA
GetDefaultCommConfigW
CancelDeviceWakeupRequest
CreateTimerQueue
InterlockedIncrement
CreateRemoteThread
FatalAppExitW
CreateConsoleScreenBuffer
FoldStringW
CommConfigDialogW
SetThreadAffinityMask
MapUserPhysicalPagesScatter
WriteConsoleInputW
SetMessageWaitingIndicator
PostQueuedCompletionStatus
GetModuleHandleW
GetPrivateProfileSectionW
GetThreadSelectorEntry
GetWindowThreadProcessId
GetStockObject
SetTextAlign
SelectObject
SetTextColor
SetBkColor
GetTextExtentPoint32W
ExtTextOutW
_vsnprintf
_except_handler3
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_vsnwprintf
__set_app_type
_controlfp
setlocale
mbstowcs
gets
_mbscspn
__iscsymf
_rmtmp
__unDNameEx
atoi
wcspbrk
_Getdays
putwc
_aexit_rtn
sqrt
_errno
_j1
isalpha
fopen
_findnext
_memicmp
_fpclass
vwprintf
iswcntrl
_ftol
_ftime
_setjmp
strpbrk
rename
strftime
_itoa
_CIsin
memcpy
_atodbl
_stati64
_wfindfirsti64
_ultow
wcsrchr
memset
_wchmod
malloc
getenv
_ismbbprint
_endthreadex
__p__winver
_Strftime
__p__winmajor
_winminor
__unDName
_findfirsti64
_adj_fprem
strtod
__isascii
_chgsign
wcstok
_wopen
free
_snwprintf
_wfindnext
strtol
_mbsupr
_mbsspnp
__p__wenviron
_strlwr
iswgraph
_adj_fdivr_m32
__STRINGTOLD
_isnan
_wfsopen
_mbctombb
_wsetlocale
_mbclen
difftime
time
_assert
_wspawnlpe
_isatty
log10
_lrotr
fputwc
_strnicmp
_findclose
_mbsnicoll
_wutime
strtok
_mbscpy
_ui64toa
fprintf
_wstati64
_adj_fdivr_m64
_wfindfirst64
ferror
freopen
_daylight
_mbsicoll
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ