Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
0fb0fe1e6c9d6b2686166425b34994fe2901628bfdb6221f308a2530139eb6d6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0fb0fe1e6c9d6b2686166425b34994fe2901628bfdb6221f308a2530139eb6d6.exe
Resource
win10v2004-20221111-en
Target
0fb0fe1e6c9d6b2686166425b34994fe2901628bfdb6221f308a2530139eb6d6
Size
75KB
MD5
46446fef46df592a222c36148ce20594
SHA1
39e2043091ec985d1c8d5867befb5a39d27c17ff
SHA256
0fb0fe1e6c9d6b2686166425b34994fe2901628bfdb6221f308a2530139eb6d6
SHA512
0d0ce1a7e2e717bd4bb1a9c3927f6374d08fafa2255f818b4a016a8011bcae5ab3587dfd0db85c9ea5fde057e34e10344f3de42ad51970de235cc323c213b416
SSDEEP
1536:9sXTM+vj0CyT8bxVCQpnE19N8raa+9t0LjV5MgRKhw:CMl8qQpno9N8raa+b0Lsgghw
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileW
GetWindowsDirectoryW
lstrcatW
VirtualAlloc
GetStockObject
RegOpenKeyExW
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ