Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
4d0f4d3f6dc245d7804674b709b8f3cbebe0049e5832595b7af32e4e9e0dcb2c.exe
Resource
win7-20220812-en
Target
4d0f4d3f6dc245d7804674b709b8f3cbebe0049e5832595b7af32e4e9e0dcb2c
Size
159KB
MD5
1d387ad35186a26dcdf294ab3871c90d
SHA1
5a290dd4b74ed4fa70c619c00c151a8c72041edd
SHA256
4d0f4d3f6dc245d7804674b709b8f3cbebe0049e5832595b7af32e4e9e0dcb2c
SHA512
376c920a0a291712def34ce0fd0069174858854e84ae1c18ca4804b5014d4f06e3528864aa12592723375622832e9e97f6014a9706c71ad6e0cafd8ca4d86603
SSDEEP
1536:B+JNN/1UzYtslXwDrMpC6LXTheM0C/lilHHQIAtcABzulb50DoPCeKLL:w/1DOsrMo6Z0C8lHP4uhXKLL
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCommandLineW
LoadLibraryA
GetProcAddress
CloseHandle
GetWindowsDirectoryW
lstrcatW
CreateFileW
VirtualAllocEx
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ