Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
23656bb38a0d24a2c966c5e44449053666e02944f1146e9a13220f4d21e47e85.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
23656bb38a0d24a2c966c5e44449053666e02944f1146e9a13220f4d21e47e85.exe
Resource
win10v2004-20220812-en
Target
23656bb38a0d24a2c966c5e44449053666e02944f1146e9a13220f4d21e47e85
Size
269KB
MD5
49cb643efe36d4772dcfe9c91fefae5a
SHA1
b8721d0f820257ff88f87ad17c6d002cb47bc3bb
SHA256
23656bb38a0d24a2c966c5e44449053666e02944f1146e9a13220f4d21e47e85
SHA512
bee89ad0c5593d70a5cda06200c0f64d6eea8eb39c6ef4f2d2bc389855d80384e9910d09cf9c7eb12448ec9716fec673cd0868220381fda7f7129f724d0bc622
SSDEEP
6144:xiNPXQDQHwWKseiAzgNW6IemvG88RBV4oPD6mrGZHXmGoJ:sbHqsRQgpInoWocqJ
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetWindowsDirectoryA
lstrcatA
CreateFileA
LoadLibraryA
GetProcAddress
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ