Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
596682f6048e71dc66a3134f814ecdb4d0d722bfbbdbb384283034f4d83b5990.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
596682f6048e71dc66a3134f814ecdb4d0d722bfbbdbb384283034f4d83b5990.exe
Resource
win10v2004-20240426-en
Target
596682f6048e71dc66a3134f814ecdb4d0d722bfbbdbb384283034f4d83b5990
Size
3.8MB
MD5
95d720f33e58dc43ab85dd5cd63ea999
SHA1
0b5a4ddbec1f752562058ef003d52de121b6b41a
SHA256
596682f6048e71dc66a3134f814ecdb4d0d722bfbbdbb384283034f4d83b5990
SHA512
7873c47447a5a80e2e4149630fffbb924aaf9c044de02731497c7c510c944990b2b2cf8ef47ee49b248aebc3aa31dee15a0f0a99fd48da9d15a40d207ff53196
SSDEEP
98304:kEbiZXJXEr5iDe6yj2tqz+EIBIuY8KZQoQkRKwEpZDa10L:oXawyi4x6pHodIwELag
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
D:\a\_work\1\s\src\BoxStub\bin\Release\Win32\boxstub.pdb
CoInitializeEx
ord17
UuidCreate
UuidToStringW
RpcStringFreeW
SHGetPathFromIDListW
CommandLineToArgvW
ShellExecuteExW
SHBrowseForFolderW
PathRemoveExtensionW
GetWindowLongW
SetWindowLongW
PostQuitMessage
EndDialog
SetWindowTextW
DialogBoxParamW
SendMessageW
GetWindow
GetWindowThreadProcessId
GetTopWindow
MessageBoxW
GetDlgItem
LoadStringW
PostMessageW
RegCloseKey
CryptGenRandom
CryptReleaseContext
DecryptFileW
RegOpenKeyExW
RegQueryValueExW
CryptAcquireContextW
FileTimeToDosDateTime
FileTimeToLocalFileTime
MoveFileExW
GlobalFree
GlobalAlloc
SetCurrentDirectoryW
GetCurrentDirectoryW
RemoveDirectoryW
GetFileAttributesW
DeleteFileW
FileTimeToSystemTime
GetSystemInfo
CreateEventA
GetModuleHandleW
GetEnvironmentVariableW
GetTickCount
SetEnvironmentVariableW
GetLastError
ExpandEnvironmentStringsW
Sleep
GetProcessId
WaitForSingleObject
GetExitCodeProcess
CloseHandle
SetFileAttributesW
InitializeCriticalSection
CreateEventW
CreateThread
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
GetCommandLineW
lstrlenW
CompareStringW
LocalFree
CreateDirectoryW
GetTempPathW
LoadLibraryW
GetProcAddress
GetSystemDirectoryW
SetDefaultDllDirectories
FreeLibrary
WaitForMultipleObjects
ExitThread
SetLastError
SystemTimeToTzSpecificLocalTime
GetSystemTime
GetTimeZoneInformation
FormatMessageW
lstrlenA
GetComputerNameW
GetLocalTime
GetVersionExW
CreateFileA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFilePointer
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
FreeLibraryAndExitThread
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
GetFileType
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
GetProcessHeap
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapSize
HeapReAlloc
ReadFile
DecodePointer
CreateFileW
WriteConsoleW
DuplicateHandle
FindFirstFileW
SetEndOfFile
ord23
ord22
ord20
VariantClear
SysAllocString
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
BCryptCreateHash
BCryptHashData
BCryptFinishHash
BCryptDestroyHash
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
?dwPlaceholder@@3PAEA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ