Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
018422a2a3534aafa33c5ce05c8365dfd271af7671b3dcabb6b46f0c135bd579.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
018422a2a3534aafa33c5ce05c8365dfd271af7671b3dcabb6b46f0c135bd579.exe
Resource
win10v2004-20221111-en
Target
018422a2a3534aafa33c5ce05c8365dfd271af7671b3dcabb6b46f0c135bd579
Size
253KB
MD5
957d1e42abba39221236f7456870ae41
SHA1
5f6b1710c71d4708af34ebff6a25cda423a23899
SHA256
018422a2a3534aafa33c5ce05c8365dfd271af7671b3dcabb6b46f0c135bd579
SHA512
ffed8705281cb0013e907dd39845fca05013fe93db1640908bcbb49ecbb35ad225c625be943351f03438e89ebcfc2d9db0891604fe58ed16e9dfe8ea6c1aaa9c
SSDEEP
6144:/aABcSx43PJdcTa0uQJkPgdsGau80T380GUK5jLe2y:CbekJdcenQaYdnaufSe2y
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteAtom
DeleteFileA
GetACP
GetAtomNameA
GetFileAttributesA
GetLastError
GlobalAlloc
CreateThread
GetCommandLineW
Sleep
WaitForSingleObject
_lopen
_lread
_lwrite
lstrcpyA
CloseHandle
GlobalReAlloc
AddAtomA
ReadFile
LoadLibraryA
VirtualAllocEx
GetProcAddress
GetSystemDirectoryA
lstrcatA
CreateFileA
SetFileAttributesA
GetOpenFileNameA
GetSaveFileNameA
RegOpenKeyA
RegSetValueA
RegQueryValueExA
RegQueryValueA
RegOpenKeyExA
RegEnumKeyA
RegCloseKey
ShellExecuteExA
ShellAboutA
ExtractAssociatedIconA
DragQueryFileA
DragFinish
DragAcceptFiles
CreateUrlCacheEntryA
DeleteUrlCacheEntry
CommitUrlCacheEntryA
memcpy
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_controlfp
_except_handler3
_initterm
free
malloc
realloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE