Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
d860d867e4de6762b3054fe6b741b614c44249a79020783e477e48061c3abfee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d860d867e4de6762b3054fe6b741b614c44249a79020783e477e48061c3abfee.exe
Resource
win10v2004-20220812-en
Target
d860d867e4de6762b3054fe6b741b614c44249a79020783e477e48061c3abfee
Size
321KB
MD5
20baa49a89186ed3d004f2b52c401026
SHA1
9adce31e8a74b1ab09bfaada121c5b2ec190eedc
SHA256
d860d867e4de6762b3054fe6b741b614c44249a79020783e477e48061c3abfee
SHA512
f5878733310f038efca7a57c562efc611e746c5beb8008d9220e74711bfa1c21b63bab605be3fd531de296dda07f8ae3bcbc42580eae299bda4b3f5094a59068
SSDEEP
6144:JT+FQond7qswMHScIOq1G/PuRnC2CkErfof7:UFhn/ycBqwuRC2gcf7
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
GetWindowsDirectoryW
lstrcatW
CreateFileW
VirtualAllocEx
GetModuleHandleA
GetProcAddress
LoadIconA
RegOpenKeyW
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ