Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
4a62e3cc02c3a93dde3d3e16ad0d21761397a540a517a8e890f2980a9e2b192a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a62e3cc02c3a93dde3d3e16ad0d21761397a540a517a8e890f2980a9e2b192a.exe
Resource
win10v2004-20220812-en
Target
4a62e3cc02c3a93dde3d3e16ad0d21761397a540a517a8e890f2980a9e2b192a
Size
321KB
MD5
725c0e3e4df4553964341d39616c32f6
SHA1
88416e7a4915a8792daffa5f8c62c9d0d6a548a9
SHA256
4a62e3cc02c3a93dde3d3e16ad0d21761397a540a517a8e890f2980a9e2b192a
SHA512
ba0383dcfea734db1248c1fe444f7bbcdca2c51a57377157c46fcf0729a5b63522d09ed37ef2baa2c58c73e6ecc07c0eb47a9c9e6eff24d245328dca9aadbb31
SSDEEP
6144:zT+FQojd7mZswMHScIOq1G/P+RnC2CkErfoL:GFhjhycBqw+RC2gcL
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
GetWindowsDirectoryW
lstrcatW
CreateFileW
VirtualAllocEx
GetModuleHandleA
GetProcAddress
LoadIconA
RegOpenKeyW
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ