Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_71b62720e368f758108a244e3619131c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_71b62720e368f758108a244e3619131c.exe
Resource
win10v2004-20231215-en
Target
VirusShare_71b62720e368f758108a244e3619131c
Size
306KB
MD5
71b62720e368f758108a244e3619131c
SHA1
de8c062055bd4dd87c2d7a24b7c2b2a49ff3dab6
SHA256
3696df02150c4151b27362a730acf4d78ad19b4be5b5bd6836ee023562b39c59
SHA512
b9f74dab3b01195d4e0fbe8d91d9510ddd6292e2f013d0d940c82b32d65a64db67768c8c31183f8c4d7c69728d628c093f970faa4d8577c0aeb4d8e9c1e96796
SSDEEP
6144:WOuatq9nLtnGR9XACo5TdW+UKaG4JFW/gRVzgUEjRhrviICU:WO9t6ZnGLX/yZaKP4J02FkrtJ
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryA
lstrlenA
lstrcpyA
CreateFileA
LoadLibraryW
GetProcAddress
VirtualAlloc
CopyFileW
BuildCommDCBAndTimeoutsW
SetCurrentDirectoryW
GlobalWire
InterlockedExchange
SetComputerNameA
GetDateFormatA
WideCharToMultiByte
IsBadHugeWritePtr
IsBadStringPtrW
GetComputerNameExA
SetEnvironmentVariableW
PeekConsoleInputA
LocalShrink
CreateToolhelp32Snapshot
TerminateThread
TerminateJobObject
MoveFileExA
GlobalGetAtomNameA
FreeResource
GetSystemDefaultUILanguage
InterlockedDecrement
HeapValidate
CompareStringW
SearchPathA
DisableThreadLibraryCalls
GetCPInfoExA
GetCurrentConsoleFont
GetCommProperties
AddAtomW
QueryPerformanceFrequency
GlobalFree
ExitProcess
MapUserPhysicalPagesScatter
BeginUpdateResourceA
GetBinaryTypeA
WriteConsoleOutputW
ResetWriteWatch
GlobalLock
GetStringTypeA
CommConfigDialogA
WinExec
QueryDosDeviceA
GetFileTime
GetCommModemStatus
TlsAlloc
FindFirstFileExW
UnregisterWait
ExpandEnvironmentStringsA
TerminateProcess
GetEnvironmentStringsA
SetCommState
DisconnectNamedPipe
GetModuleHandleW
GetExitCodeThread
lstrcmpiW
HeapSize
CopyFileExA
GlobalFlags
_lopen
GetLogicalDriveStringsA
GetSystemPowerStatus
FillConsoleOutputCharacterW
SetThreadExecutionState
GetSystemInfo
GenerateConsoleCtrlEvent
GetStdHandle
WaitCommEvent
GlobalReAlloc
HeapCreate
EnumCalendarInfoExW
GetEnvironmentVariableW
CommConfigDialogW
CreatePipe
UnlockFileEx
FindFirstFileA
FreeEnvironmentStringsW
GetVolumeInformationA
GlobalUnWire
ClearCommBreak
GetTimeFormatW
GetSystemTime
SetSystemTime
WriteConsoleW
OpenMutexA
LocalFlags
_llseek
EnumSystemLanguageGroupsA
SetConsoleActiveScreenBuffer
UnhandledExceptionFilter
LoadCursorA
UnhookWinEvent
NotifyWinEvent
GetForegroundWindow
SendIMEMessageExW
GetScrollInfo
DrawTextExA
GetSystemMetrics
ShowCursor
GetMenuState
SetClipboardViewer
FrameRect
InSendMessageEx
CreateWindowExA
DdeGetData
RealGetWindowClassA
SetMenuItemInfoA
DefFrameProcW
DrawMenuBar
RegisterClassA
LoadKeyboardLayoutA
GetClassWord
CharUpperBuffW
GetClassInfoExA
IntersectRect
GetKeyNameTextA
SetWindowRgn
GetParent
EndPaint
ShowOwnedPopups
DdeCmpStringHandles
SetMenuContextHelpId
RemoveMenu
PostMessageA
WinHelpA
DdeQueryNextServer
VkKeyScanW
WindowFromDC
LoadMenuIndirectW
GetQueueStatus
EditWndProc
EnableMenuItem
SetWindowTextA
GetScrollPos
SystemParametersInfoA
SetActiveWindow
IsWindowEnabled
GetClipboardData
DlgDirSelectExW
GetShellWindow
RealGetWindowClass
ReleaseDC
MonitorFromPoint
GetWindowThreadProcessId
MessageBeep
UnregisterClassW
EnumWindowStationsA
GetMessagePos
EnumThreadWindows
AdjustWindowRect
CreateDialogParamA
EnumDisplayDevicesA
TranslateMDISysAccel
TabbedTextOutA
ChangeMenuW
IMPGetIMEW
IsMenu
DdeDisconnectList
SetWindowsHookExW
SetScrollInfo
ShowScrollBar
CreateIconFromResourceEx
GetDesktopWindow
OpenDesktopW
DdeReconnect
MapVirtualKeyExW
wsprintfW
PostThreadMessageW
ScrollDC
CreateDesktopW
GetUserObjectInformationW
CharToOemA
GetWindowInfo
DdeSetQualityOfService
GetDlgItemTextA
GetSubMenu
SendMessageTimeoutA
DdeConnect
GetClassNameW
keybd_event
GetGuiResources
GetTopWindow
RegisterShellHookWindow
GetStockObject
RegOpenKeyExA
ExtractAssociatedIconA
DragQueryFileAorW
ExtractIconEx
SHGetFolderPathW
SHPathPrepareForWriteW
SHBrowseForFolderW
ShellHookProc
ExtractAssociatedIconW
SHGetFolderLocation
ExtractAssociatedIconExW
SHBrowseForFolderA
ShellExecuteW
SHBindToParent
SHLoadInProc
CheckEscapesW
SHAppBarMessage
SHFileOperationA
SHFormatDrive
ShellExecuteEx
SHInvokePrinterCommandW
SHGetFolderPathA
Shell_NotifyIconA
DragAcceptFiles
SHGetDesktopFolder
SHGetSpecialFolderPathW
SHInvokePrinterCommandA
SHFreeNameMappings
SHQueryRecycleBinW
SHGetDiskFreeSpaceExW
SHCreateDirectoryExA
SHFileOperationW
SHQueryRecycleBinA
SHGetFileInfoA
ExtractIconW
SHCreateProcessAsUserW
CommandLineToArgvW
DragQueryPoint
ShellAboutW
SHGetDiskFreeSpaceA
Shell_NotifyIconW
SHAddToRecentDocs
ShellExecuteExW
SHGetPathFromIDListA
DragFinish
FindExecutableW
ExtractIconA
SHGetIconOverlayIndexW
SHGetFileInfo
DoEnvironmentSubstA
SHBrowseForFolder
FindExecutableA
ExtractAssociatedIconExA
SHFileOperation
SHEmptyRecycleBinW
StrStrIA
StrStrA
StrRStrIW
StrCmpNW
StrRChrIA
StrChrW
StrChrA
StrStrW
StrRChrA
StrCmpNIA
StrCmpNIW
StrRStrIA
StrChrIW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ