Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
aadd8c7c248915c5da49c976f24aeb98ccc426fb31d1d6913519694a7bb9351a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aadd8c7c248915c5da49c976f24aeb98ccc426fb31d1d6913519694a7bb9351a.exe
Resource
win10v2004-20240226-en
Target
aadd8c7c248915c5da49c976f24aeb98ccc426fb31d1d6913519694a7bb9351a
Size
1.7MB
MD5
52c5b5e9a2ec443769dba5f44c83d7de
SHA1
662d28032eec0ce9ab7e90a7695072a7285a53e2
SHA256
aadd8c7c248915c5da49c976f24aeb98ccc426fb31d1d6913519694a7bb9351a
SHA512
ca53e9bf449603878492e3b7911f7b841caf5dbb6700a19444c96f8cb7332d38766e8870d23ec938433f12b4553c908ca93d90690baaa73168dbc42f5e4ca696
SSDEEP
24576:6KqNDKw8/TOrgMwVTRhsnaIuaSxdy3rzn2PrSS6s3QVKKKemf8s7V/OeVq26SE7y:6KaKw8tIuaSxhu7m8gVxA26by
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
AddAtomA
AddVectoredExceptionHandler
AreFileApisANSI
CloseHandle
CopyFileExW
CreateDirectoryExW
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreatePipe
CreateProcessA
CreateSemaphoreA
CreateWaitableTimerA
DeleteAtom
DeleteCriticalSection
DeleteFileW
DeviceIoControl
DuplicateHandle
EnterCriticalSection
FindClose
FindFirstFileW
FindNextFileW
FindResourceA
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeLibrary
GetComputerNameA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceExW
GetEnvironmentVariableW
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
GetHandleInformation
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetProcessHeap
GetStartupInfoA
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadContext
GetThreadPriority
GetTickCount
GetVolumeInformationA
GetWindowsDirectoryW
HeapAlloc
HeapFree
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalFree
LockResource
MoveFileExW
MultiByteToWideChar
OpenEventA
OpenProcess
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReleaseSemaphore
RemoveDirectoryW
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
SetCurrentDirectoryW
SetEndOfFile
SetEvent
SetFileAttributesW
SetFilePointerEx
SetFileTime
SetHandleInformation
SetLastError
SetProcessAffinityMask
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
SizeofResource
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForMultipleObjectsEx
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
WriteFile
__getmainargs
__initenv
__lconv_init
__mb_cur_max
__p__acmdln
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_amsg_exit
_beginthreadex
_cexit
_endthreadex
_errno
_filelengthi64
_fileno
_fstat64
_initterm
_iob
_lseeki64
_onexit
_setjmp3
_ultoa
_wfopen
abort
atoi
calloc
exit
fclose
fflush
fgetpos
fopen
fprintf
fputc
fputs
fread
free
fsetpos
fwrite
getc
getwc
isspace
iswctype
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
printf
putc
putwc
realloc
setlocale
setvbuf
signal
strchr
strcmp
strcoll
strerror
strftime
strlen
strncmp
strncpy
strxfrm
towlower
towupper
ungetc
ungetwc
vfprintf
_strnicmp
wcscoll
wcsftime
wcslen
wcsxfrm
longjmp
_write
_strdup
_read
_fileno
_fdopen
_close
AnyPopup
CloseWindow
CreateWindowExA
GetCapture
ShowWindow
WSACleanup
WSAStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE