Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
Sverka maj.exe
Resource
win7-20220414-en
Target
edc12b00df9b14ff11d99f6b98bf439d7544d1e99ebffff4a6b55e633a4fd94b
Size
96KB
MD5
c9f5c952928877b758b56a95dde47c9b
SHA1
4bfe34e994c0d864e69851ced8c848029a39ae3a
SHA256
edc12b00df9b14ff11d99f6b98bf439d7544d1e99ebffff4a6b55e633a4fd94b
SHA512
4c54e2224f60b5c81b1f5c4e57e4cec5302688b0b25678002b799be8b4da338f27a2ee2872da92848e4d41f1f2e1f0a664b36ab82c66d4ac82f56545f62f5583
SSDEEP
3072:ol8Mp1KXlKARtzp1QeNjeTPVj9yIlr5w3sAJ+qV:88q1KXlFp1CTPVRyIDusA+I
ExtKeyUsageCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetLastError
LoadIconW
DefWindowProcA
GetDesktopWindow
GetFocus
LoadCursorFromFileA
PlaySoundA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ