Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
32282fac3d962bed6bb3976abd25d1bc41e11d59612bf57cf94687c9b0e697f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32282fac3d962bed6bb3976abd25d1bc41e11d59612bf57cf94687c9b0e697f9.exe
Resource
win10v2004-20220812-en
Target
32282fac3d962bed6bb3976abd25d1bc41e11d59612bf57cf94687c9b0e697f9
Size
300KB
MD5
80106c60572f02d3faf5f86bb74d4365
SHA1
222683b8c730f186dfcc25bd382eb2182d57f96d
SHA256
32282fac3d962bed6bb3976abd25d1bc41e11d59612bf57cf94687c9b0e697f9
SHA512
8bfd79fd32d28e31ff203b77f9313a24acfa2b30258efd2c18869a54fbddc2d38a30661412c32483ab8f80da4f2c5e8dab45fc09310c713d22467961126ec450
SSDEEP
6144:Y8tPtZbacG+jRRLYOHDmVl1gSKuDLhdULvR3X9n6R:YoUcZ2OqVl9K8jKvRdn6R
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
ExitProcess
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileSize
GetFileType
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
VirtualAlloc
GetStartupInfoA
GetStdHandle
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
HeapCreate
HeapDestroy
HeapFree
QueryPerformanceCounter
SetEndOfFile
SetFilePointer
SetHandleCount
TerminateProcess
UnhandledExceptionFilter
VirtualFree
WriteFile
lstrlenA
GetProcAddress
Sleep
CharPrevA
CheckDlgButton
CreateDialogParamA
DestroyWindow
DialogBoxParamA
DispatchMessageA
EndDialog
GetDesktopWindow
GetDlgItem
GetParent
GetWindowRect
IsDialogMessageA
IsDlgButtonChecked
LoadStringA
MessageBoxA
OffsetRect
PeekMessageA
SendMessageA
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetWindowPos
ShowWindow
SystemParametersInfoA
TranslateMessage
LoadIconA
LoadCursorW
RegOpenKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ