Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_0fdea8a2436edee771c77275c574a399.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
VirusShare_0fdea8a2436edee771c77275c574a399.dll
Resource
win10v2004-20240426-en
Target
VirusShare_0fdea8a2436edee771c77275c574a399
Size
202KB
MD5
0fdea8a2436edee771c77275c574a399
SHA1
fc399aadcbf3655034a221797cad3c8b70e456a8
SHA256
c6fb5249e1cd4f80aa06735aa03ec18ddc3bac63599db6af77a02af5089db4ae
SHA512
1db8903d545040681b9504e3b36e1e06782cb5d9d6586b47cd9b3863f13e9d3aa6e3ff111857baca9e0c1bdbc1c70cfa8fa8b48065a0739e298b450fdb4b18c9
SSDEEP
3072:QA+H1p9Wj8reopqejWTdwY9YQxP808l5eNyGcAIbaMFFN4YistZuQ+omtcD48u2:R+Heop7iT+QYAP808z/YytMromtcD48N
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAllocEx
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
GetCurrentProcess
RtlUnwind
IsDebuggerPresent
LoadIconA
LoadCursorA
ShowCursor
GetStockObject
RegCloseKey
RegOpenKeyExA
CoInitializeEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ