Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2f02b470962ccf4730941e56c78b10ac6fc5e2b48973f94bbee6e1020680d754.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2f02b470962ccf4730941e56c78b10ac6fc5e2b48973f94bbee6e1020680d754.exe
Resource
win10v2004-20220812-en
Target
2f02b470962ccf4730941e56c78b10ac6fc5e2b48973f94bbee6e1020680d754
Size
364KB
MD5
34112cbd0a40ef48aaf6d438e2ffffbc
SHA1
78a64d4c1778b8a2b1d004e8eaf4a318cbe288fd
SHA256
2f02b470962ccf4730941e56c78b10ac6fc5e2b48973f94bbee6e1020680d754
SHA512
cd5c9c262bb2abfaa8933987f040c49ee542d0cf5a6f275ad874fd5df48b96bcb89657795f14f802835a6be1cd83d4dde640f1cf94cdcef96ff548eaf4a37f79
SSDEEP
6144:5kfaAuSdMZlC47Jvn3MJ+menb6aoGPBVUEaUyU:8aAu2ShBn8s/nWsi+F
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAllocEx
GetWindowsDirectoryW
lstrcatW
CreateFileW
RegOpenKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ