Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
91b1165092c4df9d5701812659014bef6a1b6722f7ef8575d731e203cb175a0e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
91b1165092c4df9d5701812659014bef6a1b6722f7ef8575d731e203cb175a0e.exe
Resource
win10v2004-20220812-en
Target
91b1165092c4df9d5701812659014bef6a1b6722f7ef8575d731e203cb175a0e
Size
269KB
MD5
a03079ff7d32e404bd904299a7033d06
SHA1
08fb62cfe6de71a0ed3cf85b568cde106d8471cb
SHA256
91b1165092c4df9d5701812659014bef6a1b6722f7ef8575d731e203cb175a0e
SHA512
029a93afb5fe8d5887aff130911397ac0088eb1499bca61ecd412eb787d81afa3d929f4aa7c5bd965c5bcd4cf0f7fba399f5fe8d57247e92dacbecb9dc69cb13
SSDEEP
6144:ViNP7DQHwWKseiAzgNj6IemvG88RBD4oPD6mrGZHXmGfn:XHqsRQgEInococFn
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetWindowsDirectoryA
lstrcatA
CreateFileA
LoadLibraryA
GetProcAddress
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ