Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_0ab20e599b5d000134e809e1aeb44149.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_0ab20e599b5d000134e809e1aeb44149.dll
Resource
win10v2004-20240508-en
Target
VirusShare_0ab20e599b5d000134e809e1aeb44149
Size
199KB
MD5
0ab20e599b5d000134e809e1aeb44149
SHA1
fce1ec63432d6ba84d6e8fb21504e3f3aaa99a16
SHA256
e654600fe62082d0b0accb87990c1d53580db024178baaa31ae8fe22a8ee9a38
SHA512
3292915023692b256dfc8144eb8bf49b342b0ca27a5a2bd51e32b4c95ec6e149cbd4dd37a9eeecbd76779f856d16ae4479853c1294918786a1cae659722de222
SSDEEP
6144:IAHgUtG6Km/ItGkd6vRJSUDaug+uQpgcQ/a:pgUtq/Rd6vR10QpQC
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAllocEx
GetModuleHandleW
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetProcAddress
RtlUnwind
TerminateProcess
IsDebuggerPresent
GetDC
LoadCursorA
LoadIconA
DefWindowProcA
EndPaint
BeginPaint
InvalidateRect
CreateWindowExA
ReleaseDC
ScrollWindow
wsprintfA
ValidateRect
PostQuitMessage
GetTextMetricsA
SetBkMode
TextOutA
GetStockObject
SelectObject
RegOpenKeyExW
RegOpenKeyExA
RegCloseKey
RegCreateKeyExW
RegEnumValueW
RegQueryValueExW
SHAddToRecentDocs
SHChangeNotify
SHGetFolderPathEx
CoInitializeEx
CoUninitialize
CoCreateInstance
PathGetDriveNumberW
PathUnquoteSpacesW
StrToIntW
PathIsUNCW
PathRemoveFileSpecW
PathGetArgsW
PathFindFileNameW
PathFileExistsW
PathAppendW
ImmDisableIME
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ