Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
81a338d8a0adf3398d43446e37eb193d7b06d926acb200ddde4453d4719aaf05.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81a338d8a0adf3398d43446e37eb193d7b06d926acb200ddde4453d4719aaf05.exe
Resource
win10v2004-20240226-en
Target
81a338d8a0adf3398d43446e37eb193d7b06d926acb200ddde4453d4719aaf05
Size
3.8MB
MD5
cc1f6b1f7e207587ee2033923c9f1a8c
SHA1
232353301cb7abf1ef26e8600799d6ab20d88b30
SHA256
81a338d8a0adf3398d43446e37eb193d7b06d926acb200ddde4453d4719aaf05
SHA512
02449369ed7eb124dd115c95ab1694f4ba6cbd877116d2963762e16718b2241776cc342d1e44431b623738aa803397beb1b6c90950148e9ce2c6602f3d94ad38
SSDEEP
98304:eEbidYUhefyW9dfuejQFKH3JR8zdJwtrJM1:eyryIH3/8zUtrq1
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
D:\a\_work\1\s\src\BoxStub\bin\Release\Win32\boxstub.pdb
CoInitializeEx
ord17
UuidCreate
UuidToStringW
RpcStringFreeW
SHGetPathFromIDListW
CommandLineToArgvW
ShellExecuteExW
SHBrowseForFolderW
PathRemoveExtensionW
GetWindowLongW
SetWindowLongW
PostQuitMessage
EndDialog
SetWindowTextW
DialogBoxParamW
SendMessageW
GetWindow
GetWindowThreadProcessId
GetTopWindow
MessageBoxW
GetDlgItem
LoadStringW
PostMessageW
RegCloseKey
CryptGenRandom
CryptReleaseContext
DecryptFileW
RegOpenKeyExW
RegQueryValueExW
CryptAcquireContextW
FileTimeToDosDateTime
FileTimeToLocalFileTime
MoveFileExW
GlobalFree
GlobalAlloc
SetCurrentDirectoryW
GetCurrentDirectoryW
RemoveDirectoryW
GetFileAttributesW
DeleteFileW
FileTimeToSystemTime
GetSystemInfo
CreateEventA
GetModuleHandleW
GetEnvironmentVariableW
GetTickCount
SetEnvironmentVariableW
GetLastError
ExpandEnvironmentStringsW
Sleep
GetProcessId
WaitForSingleObject
GetExitCodeProcess
CloseHandle
SetFileAttributesW
InitializeCriticalSection
CreateEventW
CreateThread
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
GetCommandLineW
lstrlenW
CompareStringW
LocalFree
CreateDirectoryW
GetTempPathW
LoadLibraryW
GetProcAddress
GetSystemDirectoryW
SetDefaultDllDirectories
FreeLibrary
WaitForMultipleObjects
ExitThread
SetLastError
SystemTimeToTzSpecificLocalTime
GetSystemTime
GetTimeZoneInformation
FormatMessageW
lstrlenA
GetComputerNameW
GetLocalTime
GetVersionExW
CreateFileA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFilePointer
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
FreeLibraryAndExitThread
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
GetFileType
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
GetProcessHeap
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapSize
HeapReAlloc
ReadFile
DecodePointer
CreateFileW
WriteConsoleW
DuplicateHandle
FindFirstFileW
SetEndOfFile
ord23
ord22
ord20
VariantClear
SysAllocString
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
BCryptCreateHash
BCryptHashData
BCryptFinishHash
BCryptDestroyHash
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
?dwPlaceholder@@3PAEA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ