Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
14f88a54a4dded39d2ca78c4dbcd94967a22a28c4f35bb525a996362b4be8fc0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
14f88a54a4dded39d2ca78c4dbcd94967a22a28c4f35bb525a996362b4be8fc0.exe
Resource
win10v2004-20220812-en
Target
14f88a54a4dded39d2ca78c4dbcd94967a22a28c4f35bb525a996362b4be8fc0
Size
75KB
MD5
1a8b092dd6dae1f1e38206c95a82fdda
SHA1
44bbcb7d0183935cada41a1c52035a1f3046af4a
SHA256
14f88a54a4dded39d2ca78c4dbcd94967a22a28c4f35bb525a996362b4be8fc0
SHA512
5f14cb7943e5daddbef0616d4e71f7ad5b09d9d219f1429451469c3eb3f9cc037cfb6fa746082e200390a0d2d38b33953aa4667fa42dd5a200e4c84d48976907
SSDEEP
768:MCdwVlm+7lKbAwPdqMu0SJ2aerLmmUjCp+UjC+UjCPUUjChCr7/6iAz13HR4:MLhK3dqM5SALL+7+J+YU+ACvns13H6
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryW
VirtualAlloc
GetStartupInfoA
ReadFile
GetStockObject
RegOpenKeyExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ