Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
1de6dda5b9ce8b280213c46eb96da8e77c2b443b82b91651d08099d5c5b1c06d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1de6dda5b9ce8b280213c46eb96da8e77c2b443b82b91651d08099d5c5b1c06d.exe
Resource
win10v2004-20220812-en
Target
1de6dda5b9ce8b280213c46eb96da8e77c2b443b82b91651d08099d5c5b1c06d
Size
290KB
MD5
430c1f8a7411308426cd39e8210c992f
SHA1
554adb55230e1850be76263921efdbe15a2f6a1c
SHA256
1de6dda5b9ce8b280213c46eb96da8e77c2b443b82b91651d08099d5c5b1c06d
SHA512
4df1bf5e9cdb7c540ca57c01a40ab52862fd073f6bd38a45de705f132abda3decf05baf46fae9465a667170310036851754496754da287512f59e5284076c60c
SSDEEP
6144:+fs0V09Du+Rc9DMQtc9LMojzmx1i68Nbc67pkkDvarxQdYLx3IhpD:it2C9DGh1wi6AcephDvgQY13QpD
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryW
GetWindowsDirectoryA
lstrlenA
lstrcpyA
CreateFileA
VirtualAlloc
RegOpenKeyExA
SHGetPathFromIDList
ShellAboutA
SHFormatDrive
SHFileOperationW
SHPathPrepareForWriteW
SHGetFolderPathW
SHAppBarMessage
SHGetFileInfoW
SHGetFolderPathA
WOWShellExecute
SHGetSpecialFolderLocation
ShellAboutW
SHLoadNonloadedIconOverlayIdentifiers
ShellExecuteExA
ExtractIconW
SHCreateDirectoryExA
SHGetSettings
ExtractIconExA
SHInvokePrinterCommandA
FindExecutableW
SHChangeNotify
SHBrowseForFolderW
ExtractIconA
DragQueryFileW
ShellExecuteEx
Shell_NotifyIcon
SHEmptyRecycleBinW
DragAcceptFiles
SHBindToParent
ExtractAssociatedIconExW
DragFinish
DragQueryFile
ExtractAssociatedIconExA
SHFileOperation
CommandLineToArgvW
ShellExecuteExW
SHFreeNameMappings
SHPathPrepareForWriteA
SHQueryRecycleBinA
SHLoadInProc
SHGetDataFromIDListA
SHGetDataFromIDListW
SHGetDiskFreeSpaceA
SHGetMalloc
SHEmptyRecycleBinA
SHIsFileAvailableOffline
SHBrowseForFolder
ShellHookProc
ExtractIconEx
ExtractAssociatedIconA
StrCmpNW
StrRStrIW
StrChrIW
StrChrW
StrStrW
StrRChrIA
StrChrIA
StrStrIW
StrStrIA
StrRStrIA
StrRChrA
StrCmpNIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ