Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
c696a750b62c11251d6c797f0f56b7ae55da4d47d780d505d581ac19f54df884.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c696a750b62c11251d6c797f0f56b7ae55da4d47d780d505d581ac19f54df884.exe
Resource
win10v2004-20221111-en
Target
c696a750b62c11251d6c797f0f56b7ae55da4d47d780d505d581ac19f54df884
Size
445KB
MD5
236d5ee17205937c649ecbe962bf5304
SHA1
fefcace2a498ab2d4744df0825a9ebd7e67681d7
SHA256
c696a750b62c11251d6c797f0f56b7ae55da4d47d780d505d581ac19f54df884
SHA512
e52dd52e08caed0afd7df95e1a0baa05ef013932c6f374c6274875d866c5ba20781f3c8951aba04ff679ad3cbf9e4f22cf64ce8992192fb96f2012517532d110
SSDEEP
12288:Gyjwl9/+C5IxJ845HYV5sxOH/ccccccceu:Gll5av84a5sxt
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ReadFile
GetCPInfo
VirtualAlloc
RegisterClassExW
RegOpenKeyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ