Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
b8e68f9b46ec82bfbf9a2b67e3baf4555480f40c4278c730297dc4b35478f01f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8e68f9b46ec82bfbf9a2b67e3baf4555480f40c4278c730297dc4b35478f01f.exe
Resource
win10v2004-20221111-en
Target
b8e68f9b46ec82bfbf9a2b67e3baf4555480f40c4278c730297dc4b35478f01f
Size
17KB
MD5
ccc4e7678ae9d30cf0299e53e1c18d53
SHA1
80961a1859ecab885367abc7af74fbdce81e9245
SHA256
b8e68f9b46ec82bfbf9a2b67e3baf4555480f40c4278c730297dc4b35478f01f
SHA512
e63639bff783d34a7f975a1d249eb1327388d7fdd884f3d3723ea3da14efb012f04f4097e26ed452ec3c0bdae6871176a365cd13b8da367f85598897ebd86626
SSDEEP
192:+vIB6/SNvyLXqP4KaX+4iyJZBnitG6VxUhh4WWieZWHb:GiRpyLsaX+4ilxUhh4WWieZW7
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
BackupWrite
CompareStringA
CreatePipe
DeleteTimerQueue
GenerateConsoleCtrlEvent
GetAtomNameA
GetCommTimeouts
GetConsoleAliasA
GetConsoleDisplayMode
GetCurrentDirectoryA
GetCurrentProcess
GetDiskFreeSpaceA
GetNamedPipeHandleStateW
GetPrivateProfileSectionW
GetShortPathNameW
GetStartupInfoW
GetSystemWindowsDirectoryA
GetThreadPriority
GlobalLock
GetWindowsDirectoryW
IsBadHugeWritePtr
IsDBCSLeadByte
IsDBCSLeadByteEx
LocalSize
QueryDosDeviceW
QueueUserWorkItem
SetComputerNameW
SetConsoleMode
SetConsoleTitleA
SetThreadPriorityBoost
SetVolumeMountPointA
SetWaitableTimer
UnlockFileEx
VerSetConditionMask
WaitCommEvent
WideCharToMultiByte
WriteConsoleOutputA
WritePrivateProfileSectionA
_lwrite
lstrcmpiA
HeapUnlock
GetModuleHandleA
memset
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ