Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
de57ae5bc728cd436097c390b898c5f7886107d7c330e15dc4d17bed021565aa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
de57ae5bc728cd436097c390b898c5f7886107d7c330e15dc4d17bed021565aa.exe
Resource
win10v2004-20220812-en
Target
de57ae5bc728cd436097c390b898c5f7886107d7c330e15dc4d17bed021565aa
Size
111KB
MD5
4017188db6eb103761307b5bc02280e6
SHA1
4051ce4a64426d4ddd79725b871aa508a9111475
SHA256
de57ae5bc728cd436097c390b898c5f7886107d7c330e15dc4d17bed021565aa
SHA512
f3ba96c1cd1849649d221378d917cc2bdbcfe798c4c46ec7cf9ba4527f71544c4333c5f30b079d8de61c4553bdb57a6d9528f1f41ba80ebee072e354e7a50989
SSDEEP
3072:dlvvjEL4DWgs4mDWgs4kDWgs4oDWgs46cTbB02LDBdaDJZKqySL:vDrBs5BsjBsDBsK3yJZsSL
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryW
VirtualAlloc
ExitProcess
GetStockObject
RegOpenKeyExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ