Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
12f75bffdf65aae8caffd61b99cb0d7f4020a4b06ac8839ecf33b002d0a4779c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
12f75bffdf65aae8caffd61b99cb0d7f4020a4b06ac8839ecf33b002d0a4779c.exe
Resource
win10v2004-20240508-en
Target
12f75bffdf65aae8caffd61b99cb0d7f4020a4b06ac8839ecf33b002d0a4779c
Size
587KB
MD5
80913f8ade591bfb976111e602ddafa5
SHA1
b3e1cefe2f594e03f4a0b791b215f604921630fe
SHA256
12f75bffdf65aae8caffd61b99cb0d7f4020a4b06ac8839ecf33b002d0a4779c
SHA512
3a1ab9a45ada32e990be750c0f07b5c63e130368ad189482ed318748574711b086ac5b12721e41b37beb8f8fc4e15a56682db669c7897261824b2a61d85e78b5
SSDEEP
6144:km29JkU+EmxGFe1pbzmmJztOvgfAVx/oEGpSk+KpZIw:k/jkHEmxue1pbzm6tOyAX/9MD+KpOw
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
s:\tcaddin\Output\TCRunXl.pdb
CreateThread
GetFileSize
WriteFile
DuplicateHandle
CreateFileW
GetFileAttributesExW
VerSetConditionMask
GetVersion
LoadLibraryW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
OutputDebugStringA
GetFileAttributesW
VerifyVersionInfoW
HeapAlloc
HeapFree
GetProcessHeap
HeapSetInformation
FormatMessageW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LockResource
LoadResource
SizeofResource
GetTickCount
FindResourceW
GetSystemDirectoryW
InterlockedExchange
LoadLibraryExA
SetEndOfFile
SetFilePointer
GetSystemTime
OpenMutexW
GetCommandLineW
MultiByteToWideChar
GetTimeFormatA
GetDateFormatA
GetFileSizeEx
GetTempPathW
CopyFileW
GetExitCodeProcess
GetStdHandle
SetHandleInformation
CreatePipe
InterlockedIncrement
InterlockedDecrement
GlobalAlloc
GlobalLock
GlobalUnlock
FindClose
FindFirstFileW
FindNextFileW
GetCurrentProcessId
TerminateProcess
WaitForSingleObject
OutputDebugStringW
DeleteFileW
GetLocaleInfoW
QueryPerformanceCounter
FreeLibrary
ExpandEnvironmentStringsW
RemoveDirectoryW
SetFileAttributesW
MoveFileExW
SetLastError
WriteConsoleW
SetStdHandle
GetVersionExW
GetThreadTimes
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
ReadConsoleW
GetFileType
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetCurrentThread
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LoadLibraryExW
ExitThread
IsDebuggerPresent
Sleep
GetModuleHandleW
WaitForMultipleObjects
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
ReadProcessMemory
WriteProcessMemory
GetCurrentThreadId
GetCurrentProcess
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
FlushInstructionCache
LocalFree
GetProcAddress
RaiseException
WideCharToMultiByte
GetSystemInfo
CloseHandle
ReadFile
ResumeThread
GetLastError
VirtualQueryEx
VirtualAllocEx
InitializeCriticalSectionAndSpinCount
HeapSize
HeapReAlloc
RtlUnwind
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
InterlockedCompareExchange
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
GetStringTypeW
DefWindowProcW
CallWindowProcW
UnregisterClassW
SetWindowLongW
GetWindowLongW
CharUpperW
LoadCursorW
KillTimer
SetTimer
DestroyWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
RegisterWindowMessageW
GetWindowTextW
GetWindowTextLengthW
EnableWindow
GetActiveWindow
IsDlgButtonChecked
CheckDlgButton
GetDlgItem
SetWindowTextW
SetDlgItemTextW
EndDialog
IsWindow
MessageBoxW
LoadStringW
DialogBoxIndirectParamW
DeleteObject
RegQueryValueExW
CreateRestrictedToken
CreateProcessAsUserW
OpenProcessToken
RegOpenKeyExW
RegCloseKey
GetUserNameW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ord165
ShellExecuteW
SHGetFolderPathW
CoSetProxyBlanket
CoCreateInstance
CoCreateGuid
CoInitializeEx
CoUninitialize
OleRun
SysFreeString
SysStringLen
SetErrorInfo
GetErrorInfo
SysAllocStringLen
VariantInit
VariantClear
RtlCompareUnicodeString
ord388
ord413
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ