Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
19c96ce2e1c89e02cda6a28bea466d628ece29ddddc37be69786a2db5b286f23.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19c96ce2e1c89e02cda6a28bea466d628ece29ddddc37be69786a2db5b286f23.exe
Resource
win10v2004-20220812-en
Target
19c96ce2e1c89e02cda6a28bea466d628ece29ddddc37be69786a2db5b286f23
Size
76KB
MD5
6c27f6e45dacd02853c8c69e6942701b
SHA1
a4d7d263d63f6a5c4c264b91159cd3ed608fde1b
SHA256
19c96ce2e1c89e02cda6a28bea466d628ece29ddddc37be69786a2db5b286f23
SHA512
eebfc9da2439998a38bd4a71aa7e0ea088003cbe94b8f060d4fe5a6df7f424eb3b1f2100e9eca5d3fd15774604d5e93bff259ef9b67a2fa54e059e7e0180d5ec
SSDEEP
1536:VL5OcftQgaO7x2SELr+7+J+YU+fCvns13Hf9:fdftQgaOx2SELCSkaKs131
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
CloseHandle
GetTickCount
LoadLibraryA
LocalAlloc
LocalFree
LocalLock
LocalUnlock
MoveFileExA
QueryPerformanceCounter
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
GetWindowsDirectoryW
VirtualAlloc
GetSystemTimeAsFileTime
ExitProcess
FindWindowA
GetDesktopWindow
GetLastActivePopup
GetWindowRect
IsIconic
LoadIconA
LoadStringA
MessageBoxA
MoveWindow
OpenIcon
RegisterClassA
SetForegroundWindow
ShowWindow
UpdateWindow
wsprintfA
DefWindowProcA
CreateWindowExA
BringWindowToTop
DestroyWindow
GetStockObject
RegOpenKeyExA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
exit
free
malloc
sprintf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ