Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
98503953fc161775530847bfa458dce9e3bfcc5b084ecb578a8c5313018704f4.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
98503953fc161775530847bfa458dce9e3bfcc5b084ecb578a8c5313018704f4.exe
Resource
win10v2004-20240802-en
Target
98503953fc161775530847bfa458dce9e3bfcc5b084ecb578a8c5313018704f4
Size
849KB
MD5
bf7c5aad2da5e8102f09989456a49728
SHA1
daa567a91aa4351bc4c94ef28c23c3c31f4dd5b4
SHA256
98503953fc161775530847bfa458dce9e3bfcc5b084ecb578a8c5313018704f4
SHA512
162a7e8ad805daa36b6cb20f1b1144452145fcc62163c4c8d84109edad2ad23c10988474f1a837ab2373619c4bc7995ee3fe9931feb66d4156faaef2f550db8c
SSDEEP
12288:/OmPaqhJLOgoNgQNQGDM196uXG2jJwdGoH0v59L2pWp9P8Xv7CdfsOoH61LQ5sOZ:/faCJLvhGo1DXkXOWKOKkLVRDBLuJQ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
LockResource
LoadResource
FindResourceW
CreateProcessW
VirtualAlloc
Sleep
WriteConsoleW
SetEndOfFile
HeapSize
ReadConsoleW
CreateFileW
GetProcessHeap
SetStdHandle
FreeResource
GetEnvironmentStringsW
GetCommandLineW
GetTempPathW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
ReadFile
FlushFileBuffers
GetFileType
FreeEnvironmentStringsW
GetComputerNameExW
SizeofResource
CreateDirectoryW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
GetCommandLineA
GetModuleHandleW
GetCurrentThreadId
CloseHandle
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
QueryPerformanceCounter
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
GetProcAddress
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
HeapAlloc
HeapFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
RtlUnwind
UpdateWindow
PostQuitMessage
KillTimer
LoadCursorW
GetMessageW
DefWindowProcW
GetSystemMenu
PostMessageW
DestroyWindow
MessageBoxW
CreateWindowExW
DeleteMenu
SendMessageW
GetSystemMetrics
RegisterClassExW
LoadAcceleratorsW
ShowWindow
DispatchMessageW
SetTimer
TranslateAcceleratorW
TranslateMessage
LoadIconW
CreateFontW
GetUserNameW
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
DnsQuery_UTF8
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ