Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
5d68b6338539ac3cfd3fd871b22847c4a221a9d830ca00d67bba6d7e065f025d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d68b6338539ac3cfd3fd871b22847c4a221a9d830ca00d67bba6d7e065f025d.exe
Resource
win10v2004-20220812-en
Target
5d68b6338539ac3cfd3fd871b22847c4a221a9d830ca00d67bba6d7e065f025d
Size
325KB
MD5
ed75ebd5d91473d082dfaead8b69a2d2
SHA1
b2bd7534e0fb7fd5c5375d4291d42f3343a3f7d5
SHA256
5d68b6338539ac3cfd3fd871b22847c4a221a9d830ca00d67bba6d7e065f025d
SHA512
dda9fb444d34011b0ff6108a30d6bb055b6fc53dda74b5a2419eeaeb3d133d3a42d228fb61cce1dd560d70001757455bbe5193bbebc13246bd1778412c6b9907
SSDEEP
6144:1e3NlYQGajjevClrRM2k1Pt+LCJ8kOp4x1mMwO9eGGxMbaCw3ovUXF:83XtRjj8E+2kT+LBXpDMjefxOaCw3oGF
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetProcAddress
LoadLibraryExA
PostQuitMessage
DefWindowProcA
LoadIconA
LoadCursorA
GetClientRect
DeleteEnhMetaFile
CloseEnhMetaFile
LineTo
CreateEnhMetaFileA
Rectangle
MoveToEx
PlayEnhMetaFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ