Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
0ef03fc1cd2fcdc9098ed96f736c8f9fe885659e545db76e798165dc713ea417.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ef03fc1cd2fcdc9098ed96f736c8f9fe885659e545db76e798165dc713ea417.exe
Resource
win10v2004-20220812-en
Target
0ef03fc1cd2fcdc9098ed96f736c8f9fe885659e545db76e798165dc713ea417
Size
211KB
MD5
6f4b08b7cfa8e0971ba99227f2bf52f0
SHA1
52376ef61b686309fd1cfa8e22fa6ed5e0b30233
SHA256
0ef03fc1cd2fcdc9098ed96f736c8f9fe885659e545db76e798165dc713ea417
SHA512
a1a48ec2eede4b9d1ca7109cead8fff08ea284703b4eb341837b7b5c0aaa4e6a7d990bb9b3b020419f0b849a5fa255ea028f3c8e5c68eec3080498ea6dbd3d7e
SSDEEP
3072:GoQZp2yMCluKVAYO5RsNT4/hfRZkYyFI+qS3P1LxHxiUTJ/vBcj:byMHbfRGYaIM/1LxRiGS
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetStartupInfoW
VirtualAlloc
CreateFileW
LoadIconW
RegOpenKeyExA
memcpy
_XcptFilter
__argc
__argv
__dllonexit
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_ftol
_initterm
_onexit
exit
strncpy
toupper
wcscmp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ