Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
e0c2880d84cd6cac949b6a65ae1add81cda8ab2e8dd209489865ce35ba2c475b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e0c2880d84cd6cac949b6a65ae1add81cda8ab2e8dd209489865ce35ba2c475b.exe
Resource
win10v2004-20221111-en
Target
e0c2880d84cd6cac949b6a65ae1add81cda8ab2e8dd209489865ce35ba2c475b
Size
265KB
MD5
33700ce48bfb063984735991ba2a8ec8
SHA1
2e822f8db891cd5465e23bf667e0c201f6af2e41
SHA256
e0c2880d84cd6cac949b6a65ae1add81cda8ab2e8dd209489865ce35ba2c475b
SHA512
eda162d7c66c5f56ca68a78c20c60f9e196b4f2b4f38ebab5554cbe62c9c9b88df47cca61c1af8831a634f8d4c82f2d1796bb5a340067e7b719726da813ec6ff
SSDEEP
6144:l4K3nG5g3U6R4W8lrUzTQb+atg5Hz46YXQv2ZQz5pjSTB0dMUxYK:kGTOUzMyuiHzUAv75p2C
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetWindowsDirectoryA
CreateFileA
lstrlenA
lstrcpyA
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ