Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
b6a403d2dbd24d567c95e488a7f1d03b48e997c6f2e7421e566916986b22fd97.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b6a403d2dbd24d567c95e488a7f1d03b48e997c6f2e7421e566916986b22fd97.exe
Resource
win10v2004-20220812-en
Target
b6a403d2dbd24d567c95e488a7f1d03b48e997c6f2e7421e566916986b22fd97
Size
329KB
MD5
40d805c4ea86270a21378f094a598539
SHA1
fef6c3ba269255691d5676cdbec007e970e1d08e
SHA256
b6a403d2dbd24d567c95e488a7f1d03b48e997c6f2e7421e566916986b22fd97
SHA512
73b6c9206d76c6c8ad258344c0690504d84d84a13fe903b5b1ecba53bacabcd9cbda472520b8b7cc80e7cc947cd8bea02b688706e5ae72c35dd12c4012a4e758
SSDEEP
6144:eYwaU+TjJf6Qy/VsoUKIVflNiLoWtMb9QJTPPWZYbFv:NwP+P8QEsooiX+b9Q1nWZs
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcatW
GetModuleHandleA
GetProcAddress
CloseHandle
CreateFileW
GetWindowsDirectoryW
VirtualAllocEx
LoadIconA
RegOpenKeyW
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ