Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
0b9f210f96ee15ca42e4f4eeb8351b122f4fabfc58a72f8045a6db2baf81ad48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0b9f210f96ee15ca42e4f4eeb8351b122f4fabfc58a72f8045a6db2baf81ad48.exe
Resource
win10v2004-20220812-en
Target
0b9f210f96ee15ca42e4f4eeb8351b122f4fabfc58a72f8045a6db2baf81ad48
Size
284KB
MD5
6bea8d300b742d3acd2974cef1295347
SHA1
9901d303326c699fdd69d4cba87d2ac252ef2aa7
SHA256
0b9f210f96ee15ca42e4f4eeb8351b122f4fabfc58a72f8045a6db2baf81ad48
SHA512
f6d140272ad1d564bc7fd45f6fd4e8e2b7d416a3aa39025dd47ebc0ffc959fe6075c65aaf28d9c0717475d84a0904fdb3dac5ecdccbd25a859d424e12f371196
SSDEEP
6144:8XrlvdqWLqOKY/B5RyaynzgvGq6JhW7sQgtm0DTTd:8Xr/zLV/B5YzFHRtm6
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryA
lstrlenA
lstrcpyA
CreateFileA
LoadLibraryA
GetProcAddress
VirtualAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ