Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
327d08bfc015989aeb8934bc6d86ee6cbc7b3da8f467786c689931a89f7753d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
327d08bfc015989aeb8934bc6d86ee6cbc7b3da8f467786c689931a89f7753d0.exe
Resource
win10v2004-20220812-en
Target
327d08bfc015989aeb8934bc6d86ee6cbc7b3da8f467786c689931a89f7753d0
Size
267KB
MD5
908f675ccf4c5eb03b828d11f8357ab9
SHA1
2f721aa30345208bab4201a933271dff5a7e62ad
SHA256
327d08bfc015989aeb8934bc6d86ee6cbc7b3da8f467786c689931a89f7753d0
SHA512
3e546d877aa4766f8ae119dedc38b983ac5678768aaf484a4f9cbe77c4d7e27b553d5976d24450580a268304cb6eec78765ebbca8a32ae00fcb260853a762d56
SSDEEP
6144:UipFSrEWyXvXpqo2pZrqtWRmnUGv9vzAGEqN38:UKFSrEWyfUJMKW+GEW3
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetWindowsDirectoryA
CreateFileA
lstrlenA
lstrcpyA
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ