Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
aa6b6e439bed6fd6a0b159412741cc96.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa6b6e439bed6fd6a0b159412741cc96.exe
Resource
win10v2004-20240226-en
Target
aa6b6e439bed6fd6a0b159412741cc96
Size
118KB
MD5
aa6b6e439bed6fd6a0b159412741cc96
SHA1
3222e7ac223b37ee4eb45f981af81e20a86df292
SHA256
6880c6133f6d8387bd6c08f32913af5fbc8fdf8ac5a3c3f38e523c743e836dbf
SHA512
a020202e908b5a8e81c2c1081f0d33c23a128c3da7823ce9d1bc7a5865d9cc7b4ecec4deded7e506a0efcab72a5d9bbf3b01848f6eb51821b537622f33d618d5
SSDEEP
1536:91P/M9UKVfxeUwxi5s/SxN/AbdonWR5FX9BbikbPExSu/MNQfSr71xLpsxBg:LHM9UKTe9asaxN2LXjbikbwf2nbwBg
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetConsoleAliasA
GetConsoleAliasesLengthA
GetConsoleFontSize
GetCurrentProcess
GetDateFormatA
GetDateFormatW
GetDefaultCommConfigW
GetExitCodeProcess
GetFileTime
GetLargestConsoleWindowSize
GetLastError
GetLongPathNameW
GetPrivateProfileIntA
GetPrivateProfileSectionA
GetPrivateProfileStructA
GetProcessHeap
GetProcessHeaps
GetProfileIntW
GetQueuedCompletionStatus
GetShortPathNameW
GetStartupInfoA
GetSystemDefaultUILanguage
GetSystemDirectoryW
GetTimeFormatA
GetVersion
GlobalAlloc
GlobalFindAtomW
HeapCreate
IsBadHugeWritePtr
LoadLibraryExW
LockFile
MapUserPhysicalPages
MapViewOfFile
MoveFileA
MoveFileExA
MoveFileWithProgressW
OpenMutexA
GetCalendarInfoA
FreeEnvironmentStringsA
OutputDebugStringA
PeekConsoleInputA
Process32First
Process32FirstW
QueryPerformanceFrequency
QueueUserWorkItem
ReadConsoleInputA
ReadConsoleOutputA
ReadConsoleOutputCharacterW
RtlUnwind
ScrollConsoleScreenBufferA
SetCommTimeouts
SetComputerNameW
SetConsoleMode
SetEnvironmentVariableW
SetFileApisToANSI
SetFileApisToOEM
SetFilePointerEx
SetLocaleInfoA
SetWaitableTimer
SystemTimeToTzSpecificLocalTime
TerminateJobObject
TryEnterCriticalSection
UpdateResourceW
VerLanguageNameA
VirtualAllocEx
VirtualLock
VirtualQueryEx
WaitForDebugEvent
WideCharToMultiByte
WriteConsoleA
WriteFileGather
_lopen
lstrcat
lstrcmp
lstrcmpiA
OpenProcess
GetACP
FormatMessageA
VirtualAlloc
FillConsoleOutputCharacterW
FileTimeToSystemTime
ExitThread
EscapeCommFunction
DosDateTimeToFileTime
DeviceIoControl
DeleteFileW
DebugActiveProcess
CreateTimerQueueTimer
CreateThread
CreateProcessW
CreatePipe
CreateMutexA
CreateEventA
CallNamedPipeW
BackupRead
AddAtomA
LoadLibraryW
GetProcAddress
LoadLibraryA
ExitProcess
OpenSemaphoreW
GetStockObject
ReplaceTextW
ReplaceTextA
PrintDlgW
PrintDlgExW
PrintDlgExA
PrintDlgA
PageSetupDlgW
PageSetupDlgA
GetSaveFileNameW
GetSaveFileNameA
GetOpenFileNameW
GetOpenFileNameA
GetFileTitleW
GetFileTitleA
FindTextW
FindTextA
CommDlgExtendedError
ChooseFontW
ChooseFontA
ChooseColorA
ChooseColorW
RegOpenKeyExW
AssocQueryKeyW
AssocQueryStringA
ChrCmpIA
PathAddExtensionW
PathAppendA
PathBuildRootW
PathCommonPrefixA
PathCommonPrefixW
PathCompactPathExA
PathFindFileNameW
PathGetCharTypeW
PathGetDriveNumberW
PathIsFileSpecA
PathIsFileSpecW
PathIsLFNFileSpecA
PathIsRootW
PathIsSameRootA
PathIsSystemFolderW
PathIsUNCServerW
PathMakePrettyA
PathMatchSpecA
PathParseIconLocationA
PathQuoteSpacesA
PathRelativePathToA
PathRemoveArgsW
PathRemoveExtensionW
PathRenameExtensionA
PathSearchAndQualifyA
PathSetDlgItemPathW
PathSkipRootA
PathStripToRootA
PathStripToRootW
PathUnExpandEnvStringsW
PathUndecorateA
PathUnmakeSystemFolderA
PathUnmakeSystemFolderW
SHCopyKeyA
ord16
SHDeleteEmptyKeyA
SHDeleteKeyW
SHDeleteValueA
SHEnumKeyExA
SHGetInverseCMAP
SHGetValueA
SHOpenRegStream2A
SHQueryInfoKeyW
SHRegCloseUSKey
SHRegDuplicateHKey
SHRegEnumUSKeyW
SHRegEnumUSValueW
SHRegGetBoolUSValueW
SHRegGetUSValueA
SHRegOpenUSKeyA
SHRegOpenUSKeyW
SHRegSetPathA
SHRegSetPathW
SHStrDupW
StrCSpnIW
StrChrIW
StrCmpIW
StrCmpNIA
StrCpyNW
StrCpyW
StrFormatKBSizeA
StrNCatW
StrPBrkW
StrRChrW
StrSpnA
StrSpnW
StrStrIW
StrToIntA
StrTrimW
UrlCanonicalizeW
UrlCompareA
UrlCreateFromPathA
UrlGetPartA
UrlHashW
UrlIsNoHistoryW
UrlIsOpaqueW
wnsprintfW
wvnsprintfA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ