Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
6c666f951cc044e531a1f39416e2d55a3ced35d5f60a76b1e3ba919aa72f96a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c666f951cc044e531a1f39416e2d55a3ced35d5f60a76b1e3ba919aa72f96a2.exe
Resource
win10v2004-20220812-en
Target
6c666f951cc044e531a1f39416e2d55a3ced35d5f60a76b1e3ba919aa72f96a2
Size
284KB
MD5
12c2294af8d7ed15f0ae68ce9bdce81f
SHA1
392a9caf88039e19922beb387e6306fac4b7402a
SHA256
6c666f951cc044e531a1f39416e2d55a3ced35d5f60a76b1e3ba919aa72f96a2
SHA512
baae6786c93091775c184cd2123122cb58234f8e468d846c4634000a3847e90136474bdb984f9058af027ba102d373326ee417c5edc11c2ca716cc72fbb9ed0e
SSDEEP
6144:HXGlvdqWLqOKz/B5RyaynzgvGq6JhW7YQgtm0DT0X:HXG/zLS/B5YzFHxtmf
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryA
lstrlenA
lstrcpyA
CreateFileA
LoadLibraryA
GetProcAddress
VirtualAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ