Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
3e0f424a18a0b59cb3a2fcbb3e12f6ce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e0f424a18a0b59cb3a2fcbb3e12f6ce.exe
Resource
win10v2004-20231215-en
Target
3e0f424a18a0b59cb3a2fcbb3e12f6ce
Size
270KB
MD5
3e0f424a18a0b59cb3a2fcbb3e12f6ce
SHA1
2eb404ceb6e147934f601f62a45331898e920487
SHA256
2fd10e735b787ec85fc57ec8b4e21450255dcd221adcc4b1ec53457eae2fcb1b
SHA512
6cc9a3d7ff97d2fbf6d93f1658ea9c509ee3f6be41e55ad56a80cb7465d68ed86d728c2df908ca82c252979d8f082a69de89fccd4c53872b39a31960f552ef94
SSDEEP
6144:dg9i89Rc1cdzRTsN1OfIy5P1R1FUb9Yl5pSHEvkSVH6qIceYsCK3CL:K939Rc1cdRY1CtVVpo6fH624Cz
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateFileA
GetWindowsDirectoryA
lstrcatA
GetModuleHandleA
GetProcAddress
GetStockObject
memcpy
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ