Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
985ec7d41cea2d1a8addfbf0f19765c2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
985ec7d41cea2d1a8addfbf0f19765c2.exe
Resource
win10v2004-20231215-en
Target
985ec7d41cea2d1a8addfbf0f19765c2
Size
8.9MB
MD5
985ec7d41cea2d1a8addfbf0f19765c2
SHA1
338a6b065076966eaea4534815876be325d03b07
SHA256
c4b6239aef90800d3551a0bc1ed9520882a25059a2eb6e166c2965e897282a95
SHA512
55021fdda15897820d19b192cd75cbe9ccb4baf1f016a75d81f8c25f56c3f4e8f0835a71615ef211b777cc865a5e96e51feed4fbca512cca61909dd176826e20
SSDEEP
196608:zCJLrlPu2r5yLZfFqVJQ3vpzZJ4W2ymT7q:W1rtu2lkZfFqVqfvJtmT7q
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_NET_RUN_FROM_SWAP
D:\work\e0dd96435fde7cb0\BUILDS\Release\x64\SfxInst.pdb
RtlPcToFileHeader
RtlCaptureContext
RtlLookupFunctionEntry
RtlNtStatusToDosError
RtlVirtualUnwind
RtlUnwindEx
RtlUnwind
GetStdHandle
WriteConsoleW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CloseHandle
SetLastError
GetLastError
CreateFileW
DeviceIoControl
FindClose
WideCharToMultiByte
FindFirstFileW
RemoveDirectoryW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
GetModuleHandleW
GetProcAddress
CreateProcessW
ResumeThread
GetCurrentThread
HeapAlloc
GetProcessHeap
GetSystemDirectoryW
lstrcatW
GetModuleHandleA
LocalFree
CreateEventW
GetExitCodeProcess
GetCurrentProcess
FindResourceW
SizeofResource
LockResource
LoadResource
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
SetEvent
CreateThread
TerminateThread
GetLocaleInfoW
MultiByteToWideChar
Sleep
FileTimeToSystemTime
GetCurrentThreadId
GetUserDefaultLangID
GetCommandLineW
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
GetFileSizeEx
ReadFile
GetFileTime
GetNativeSystemInfo
GetPrivateProfileStringW
IsProcessorFeaturePresent
FormatMessageW
SetFilePointerEx
LoadLibraryExW
FreeLibrary
TerminateProcess
WaitForMultipleObjects
CompareStringW
WriteFile
ResetEvent
FlushFileBuffers
DeleteFileW
GetFileInformationByHandle
GetFullPathNameW
OutputDebugStringA
TlsAlloc
TlsGetValue
TlsSetValue
HeapFree
GetModuleHandleExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetThreadId
InitializeCriticalSectionEx
CreateSemaphoreW
ReleaseSemaphore
TryEnterCriticalSection
GetSystemInfo
GetVersionExW
GetTickCount
QueryPerformanceCounter
ExpandEnvironmentStringsW
GetModuleFileNameW
GetShortPathNameW
GetFileAttributesW
GetWindowsDirectoryW
GetProcessAffinityMask
GetLongPathNameW
VirtualAlloc
VirtualFree
VirtualProtect
HeapDestroy
HeapReAlloc
GlobalMemoryStatusEx
SystemTimeToTzSpecificLocalTime
GetExitCodeThread
TlsFree
GetDriveTypeW
SetFilePointer
SetFileAttributesW
GetFileSize
SetEndOfFile
MoveFileExW
LockFileEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
DuplicateHandle
SetFileTime
CreateDirectoryW
GetCurrentDirectoryW
FindFirstFileExW
FindNextFileW
QueryDosDeviceW
GetEnvironmentVariableW
SetEnvironmentVariableW
WriteProcessMemory
InitializeCriticalSectionAndSpinCount
LoadLibraryW
lstrcmpiA
GetVolumePathNameW
GetVolumeNameForVolumeMountPointW
GetVersion
HeapSize
FindResourceExW
RaiseException
DecodePointer
UnlockFileEx
SetFileInformationByHandle
GetDiskFreeSpaceExW
FreeResource
K32GetMappedFileNameW
FindFirstVolumeW
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
VirtualQuery
GetSystemTimes
GetTickCount64
PeekNamedPipe
GetFileType
FreeLibraryAndExitThread
ExitThread
SystemTimeToFileTime
SetStdHandle
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
LoadLibraryExA
WaitForSingleObjectEx
GetStringTypeW
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
FormatMessageA
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
EncodePointer
LCMapStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
OutputDebugStringW
InterlockedPushEntrySList
TzSpecificLocalTimeToSystemTime
ExitProcess
asw_process_storage_allocate_connector
asw_process_storage_deallocate_connector
on_avast_dll_unload
onexit_register_connector_avast_2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ