Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
dfc6750fd36a6973dc31fd544d6ffc5ba2ada8b6d2d93fd1767c4b2ef369f710.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
dfc6750fd36a6973dc31fd544d6ffc5ba2ada8b6d2d93fd1767c4b2ef369f710.exe
Resource
win10v2004-20240508-en
Target
dfc6750fd36a6973dc31fd544d6ffc5ba2ada8b6d2d93fd1767c4b2ef369f710.exe
Size
1.4MB
MD5
38e37b31b669055f70a7f95bac99272c
SHA1
1e2b2a68626d4f0698c700da7d211cbb77af0fd7
SHA256
dfc6750fd36a6973dc31fd544d6ffc5ba2ada8b6d2d93fd1767c4b2ef369f710
SHA512
80614d2a307e012414f363119fcac2ad713efbc217b570ece17fce7b162b3e080d93f23d755100824a763180b3250fd7abddc6ebab2b09441a00c8a77017e01e
SSDEEP
24576:r0RK2Jm88iHN0HA3MgUR79ShaI1MnltaR3vjeZAiU22B5UrCAPpkt6C:ryK288jHN4gC9C71M7q3OvgDAzC
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
LoadResource
FindResourceExW
FindResourceW
InitializeCriticalSectionEx
DeleteCriticalSection
VirtualQuery
VirtualProtect
VirtualAlloc
GetSystemInfo
LockResource
GetUserDefaultUILanguage
FindFirstFileW
GetFileAttributesW
lstrlenA
GetEnvironmentVariableW
CreateFileW
WriteConsoleW
SizeofResource
WaitForSingleObject
CloseHandle
CreateProcessW
GetStdHandle
GetStartupInfoW
GetModuleFileNameW
FreeLibrary
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetLastError
RaiseException
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetProcAddress
LoadLibraryExW
EncodePointer
RtlPcToFileHeader
RtlUnwind
WriteFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
OutputDebugStringW
FindClose
FindFirstFileExA
FindNextFileA
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
SetStdHandle
GetFileType
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadStringW
CharNextW
MessageBoxW
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
ShellExecuteExW
PathAppendW
PathRemoveFileSpecW
VerQueryValueW
GetFileVersionInfoSizeExW
GetFileVersionInfoExW
EventUnregister
EventRegister
EventWrite
EventProviderEnabled
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetCallstack64
IsAssertEtwEnabled
SetOnAssertCallback
WriteAssertEtwEventA
WriteAssertEtwEventW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ