Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_22a1ba564652592f386d355d21c2367a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_22a1ba564652592f386d355d21c2367a.dll
Resource
win10v2004-20231215-en
Target
VirusShare_22a1ba564652592f386d355d21c2367a
Size
199KB
MD5
22a1ba564652592f386d355d21c2367a
SHA1
8409df83841801786e868948e74024c915937ccb
SHA256
b2a3b1a33f66fbc816dd6ca98983ee88eb58dde70134b637965bd65c8c82aea9
SHA512
757e2bc5a6fd8665e09cb708e59e8df3bc1073e4f948df06daefb7991695f725e208f971ce754c22c3be7f876e87ffbd8e166fab95b9a30a10952907f8a08326
SSDEEP
3072:8aaRZAquVPVMgq+x+9zKfgTjVJ/yh4WXBxD7QUnNGvCaBaZJy4tOsxRKvWkR0H:9jn8zxyh5LQUUvCDZE4tjKnRU
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
VirtualAllocEx
TerminateProcess
RtlUnwind
GetModuleHandleW
GetProcAddress
IsDebuggerPresent
LoadIconA
LoadCursorA
GetStockObject
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegOpenKeyExA
SHChangeNotify
SHAddToRecentDocs
CoUninitialize
CoCreateInstance
CoInitializeEx
PathFindFileNameW
PathAppendW
PathGetDriveNumberW
PathIsUNCW
PathRemoveFileSpecW
PathUnquoteSpacesW
PathGetArgsW
PathFileExistsW
StrToIntW
ImmDisableIME
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ