Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
04ffeea6437f4f7c227c7d4fcf26721b0b19d8d900df4b1e0c789bb911c00f1d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
04ffeea6437f4f7c227c7d4fcf26721b0b19d8d900df4b1e0c789bb911c00f1d.exe
Resource
win10v2004-20220812-en
Target
04ffeea6437f4f7c227c7d4fcf26721b0b19d8d900df4b1e0c789bb911c00f1d
Size
322KB
MD5
28ac255a46e03f1eb6ba2303f60ec297
SHA1
fdbb0fb86a337b02d05694884a4acf4d7ee2f1cd
SHA256
04ffeea6437f4f7c227c7d4fcf26721b0b19d8d900df4b1e0c789bb911c00f1d
SHA512
6aa457d5667c4dbd7dd083252303b36177481318d875c0402e467b01ca68d214daa7cdf173e2a76ac7199ad3702c04697dfe1260066116d027482371d0ac9f5a
SSDEEP
6144:JVcTdnzQPSqzXXyydn3nozW5TFYkI4uLZMGLv+xxxxxxxxxxxxxxxxngxxxxxxx5:JyTdzQPRHvdn34y3IbnLGxxxxxxxxxxu
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAllocEx
GetWindowsDirectoryW
lstrcatW
CreateFileW
GetCommandLineA
InvalidateRect
GetDC
ReleaseDC
BeginPaint
LoadCursorA
SetCursor
ShowCursor
EndPaint
PostQuitMessage
DefWindowProcA
LoadIconA
RegisterClassExA
CreateWindowExA
SetPixel
LineTo
GetStockObject
RegOpenKeyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ