Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
ac4ec4110f6c0f3efb11905d1014e7e02d21c747a5a5dd5533aa6bc60b567be8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac4ec4110f6c0f3efb11905d1014e7e02d21c747a5a5dd5533aa6bc60b567be8.exe
Resource
win10v2004-20220812-en
Target
ac4ec4110f6c0f3efb11905d1014e7e02d21c747a5a5dd5533aa6bc60b567be8
Size
111KB
MD5
0ab09d5967a485818d5cc9a83c76b478
SHA1
592c31f27bab82658a6089e61cd397a5fa15fd4a
SHA256
ac4ec4110f6c0f3efb11905d1014e7e02d21c747a5a5dd5533aa6bc60b567be8
SHA512
c63b9789c746790db4d687fe17906cca73d5967abc9f194525b49bca5d0b99aab2b41b2b31a6bf9e78e9e0cf4a4185459ce88fe8e9f64dd64092cad428984b78
SSDEEP
3072:Elvsj6LZDWgs4mDWgs4kDWgs4oDWgs4ccTbB02LDBdaDJZKqyS5:4IsBs5BsjBsDBss3yJZsS5
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryW
VirtualAlloc
ExitProcess
GetStockObject
RegOpenKeyExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ