Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
127f07ca1605f85fb169972d1fa5ab3daab7517774fd2c977b363d93140ec3f3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
127f07ca1605f85fb169972d1fa5ab3daab7517774fd2c977b363d93140ec3f3.exe
Resource
win10v2004-20220812-en
Target
127f07ca1605f85fb169972d1fa5ab3daab7517774fd2c977b363d93140ec3f3
Size
300KB
MD5
08e76e626ef18cdac3684e91a2d06b4c
SHA1
6c77b6b4745d86a8a3fec650cc5e0160265fbb8a
SHA256
127f07ca1605f85fb169972d1fa5ab3daab7517774fd2c977b363d93140ec3f3
SHA512
4cf205bfe9a4c8280b848258c31b3b13b5f25dc2956c5d78f20e626966c67a34d6f86a78626bdaab38f7681c32d6a64cb75b2041cbf67a6c569b0e0f1daf320a
SSDEEP
6144:C8yPtZbacG+jRRLYOHDmVl1gSKuDLhdULvR3X9p6W:ChUcZ2OqVl9K8jKvRdp6W
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
ExitProcess
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileSize
GetFileType
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
VirtualAlloc
GetStartupInfoA
GetStdHandle
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
HeapCreate
HeapDestroy
HeapFree
QueryPerformanceCounter
SetEndOfFile
SetFilePointer
SetHandleCount
TerminateProcess
UnhandledExceptionFilter
VirtualFree
WriteFile
lstrlenA
GetProcAddress
Sleep
CharPrevA
CheckDlgButton
CreateDialogParamA
DestroyWindow
DialogBoxParamA
DispatchMessageA
EndDialog
GetDesktopWindow
GetDlgItem
GetParent
GetWindowRect
IsDialogMessageA
IsDlgButtonChecked
LoadStringA
MessageBoxA
OffsetRect
PeekMessageA
SendMessageA
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetWindowPos
ShowWindow
SystemParametersInfoA
TranslateMessage
LoadIconA
LoadCursorW
RegOpenKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ