Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
MicrosoftTeamsX64exeptbr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MicrosoftTeamsX64exeptbr.exe
Resource
win10v2004-20240802-en
Target
MicrosoftTeamsX64exeptbr.exe
Size
1.4MB
MD5
e074a5aa451fde9af9a7c5259c0de5a6
SHA1
880a369a6d4750d5a69fdaeb84d6e2c2c88a074b
SHA256
add46036fd3cc54df5e43dd626d8a3587a7dd97f0f72d7dd2a7731934a129548
SHA512
44fbc39bb1c373715d09e49e4499513aca1d01e3dad63affe1d0cbe753c71741035e90d0fe8133b53fbd1bd5e0e4cc7e6a83fdc59f8a13fed22bd6b45c297588
SSDEEP
24576:c9Yu8GgnSf7uw7T8qrbuXX2iQNyfPJxUrmvSPcYoVB1cVz7Z3ipp:7GMo7NJbunbQNMPn2ch4Z3O
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\a\_work\1\s\src\Setup\bin\Release\Setup.pdb
InitializeCriticalSectionEx
GetFileAttributesW
CreateFileW
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
WideCharToMultiByte
CreateDirectoryW
WriteFile
SetFileTime
FreeResource
LoadResource
FindResourceW
SizeofResource
LockResource
CopyFileW
FindFirstFileW
FindClose
CreateProcessW
IsWow64Process
lstrcmpiW
LeaveCriticalSection
RaiseException
EnterCriticalSection
LoadLibraryExW
GetCurrentThreadId
DecodePointer
WriteConsoleW
SetStdHandle
FreeLibrary
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
LoadLibraryW
GetCurrentProcess
GetModuleFileNameW
DeleteFileW
CloseHandle
GetExitCodeProcess
WaitForSingleObject
MoveFileW
GetTempFileNameW
GetLastError
GetTempPathW
lstrlenW
DeleteCriticalSection
GetModuleHandleW
GetProcAddress
VerSetConditionMask
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapReAlloc
HeapSize
ReadConsoleW
SetFilePointerEx
GetConsoleMode
SetEndOfFile
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
HeapAlloc
HeapFree
VerifyVersionInfoW
GetStringTypeW
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
RtlUnwind
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
ExitWindowsEx
wsprintfW
CharNextW
MessageBoxW
DestroyWindow
GetActiveWindow
LoadStringW
GetTokenInformation
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegGetValueW
RegCloseKey
GetUserNameW
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegSetValueExW
RegQueryValueExW
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
VariantInit
SysAllocString
SysFreeString
VarUI4FromStr
VariantClear
URLDownloadToFileW
GetFileVersionInfoSizeExW
VerQueryValueW
GetFileVersionInfoExW
PathFileExistsW
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ