Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1.exe
Resource
win10v2004-20220901-en
Target
f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1
Size
260KB
MD5
0de177ac36fadd32af63e5f8a78da5ba
SHA1
4e59c65d3de0b57b11cf67e7b2d3bc2a07683b31
SHA256
f716d011693a7f678eabf3fc0c1840a71abe433b6c237fd55b557f67b0d351d1
SHA512
d4792b3a5d933da71c5289888cc0ea1977b71647f7a3fb2e09cdeb1bfce959d5e252f972f2814ffb26bd6414a28020fac0bf4a5a3827d11bb9a64290932d9750
SSDEEP
6144:NzK1gF5AC2z44Em6Tvr9mP/qB8i0Ea0heJQ2C6z:jDw44Emqro3qB8RwhODZz
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualFree
SetHandleCount
HeapFree
HeapDestroy
HeapCreate
VirtualAlloc
GetFileType
GetEnvironmentStringsW
GetACP
ExitProcess
GetOEMCP
ExitWindowsEx
CharPrevA
LoadIconA
LoadCursorA
MessageBoxA
LoadStringA
CharNextA
GetStockObject
RegCreateKeyA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegConnectRegistryW
OpenProcessToken
LookupPrivilegeValueW
LookupPrivilegeValueA
LookupAccountSidW
GetTokenInformation
FreeSid
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExW
RegOpenKeyA
RegEnumValueA
EqualSid
RegCloseKey
RegOpenKeyExA
AdjustTokenPrivileges
AllocateAndInitializeSid
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
CoUninitialize
CoCreateInstance
CoInitialize
PathRemoveFileSpecA
StrStrIA
wnsprintfA
StrCatBuffA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ