Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
696f59c181cb0559ac78f6d68e68e2769af07ca15d2d0aec902707ad9951a288.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
696f59c181cb0559ac78f6d68e68e2769af07ca15d2d0aec902707ad9951a288.exe
Resource
win10v2004-20220901-en
Target
696f59c181cb0559ac78f6d68e68e2769af07ca15d2d0aec902707ad9951a288
Size
325KB
MD5
08c75fceaf65814abf2fc656e934a566
SHA1
38b1fd883ce7e5fbfdfdc07e014746f9bc711172
SHA256
696f59c181cb0559ac78f6d68e68e2769af07ca15d2d0aec902707ad9951a288
SHA512
0c6ddce421996266b0394d1e7f91ef735d3a69204b5213305ebfbc3c208058d303eb1b8108ab5a6e4dc0c83d2ea3933f41f180ffdf3f8e9ffd80133882121fb3
SSDEEP
6144:ie3NlYQGajwev0lW9RM2k1Pt+LCJ8kOp4x1mMwO9eGGxMbaCw3ovUxc:j3XtRjw8KWY2kT+LBXpDMjefxOaCw3o5
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetProcAddress
LoadLibraryExA
PostQuitMessage
DefWindowProcA
LoadIconA
LoadCursorA
GetClientRect
DeleteEnhMetaFile
CloseEnhMetaFile
LineTo
CreateEnhMetaFileA
Rectangle
MoveToEx
PlayEnhMetaFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ