Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
116fa84d9637992b8898e10b2102a8fb298db0bc088bc90226699b092a9b3136.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
116fa84d9637992b8898e10b2102a8fb298db0bc088bc90226699b092a9b3136.exe
Resource
win10v2004-20220812-en
Target
116fa84d9637992b8898e10b2102a8fb298db0bc088bc90226699b092a9b3136
Size
274KB
MD5
9a4360eab98004b11662abe904e4ffe8
SHA1
69088870c0969523c45b6aa9ae64ee80766c91d1
SHA256
116fa84d9637992b8898e10b2102a8fb298db0bc088bc90226699b092a9b3136
SHA512
2801121bfe55e96a2b5aafd75c905f469bb51239144a54a3e306df9d9776a3db2dacd086726710847fb0d076b9a5c580fe8f867a3fe5466498733be222012fa2
SSDEEP
6144:jdNauEvlzPWzCWBW5V99bi9OD5fs6/1gGHdfay:xNDEgzCW8riofs9GBay
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetWindowsDirectoryA
lstrcatA
CreateFileA
memcpy
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ