Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
96331c6be098b525d4c3e4df6333d6f4dc3c5eba63ac55cd0f2b0f31716ce021.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96331c6be098b525d4c3e4df6333d6f4dc3c5eba63ac55cd0f2b0f31716ce021.exe
Resource
win10v2004-20220812-en
Target
96331c6be098b525d4c3e4df6333d6f4dc3c5eba63ac55cd0f2b0f31716ce021
Size
265KB
MD5
816d6adc419ae3291ed3989311b58819
SHA1
2e90d3a1af99d56489f41eaa9ff979fb76ac3070
SHA256
96331c6be098b525d4c3e4df6333d6f4dc3c5eba63ac55cd0f2b0f31716ce021
SHA512
caeadae7ac16447b6c7bd78dc6889d099efacab16285db03e5caca3ee4530ce868853ab8c505f49be33cb51f84a51ee5aede2aad1a8bb606c4773ec031430415
SSDEEP
6144:O4K3nG5g3U6R4W8lrUzTQb+atz5Hz46YXQv2ZQz5GjSTB0dMUxYK:ZGTOUzMyuFHzUAv75G2C
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetWindowsDirectoryA
CreateFileA
lstrlenA
lstrcpyA
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ