Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
20e4eb0c6c37705205e33e29056e264d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20e4eb0c6c37705205e33e29056e264d.exe
Resource
win10v2004-20231215-en
Target
20e4eb0c6c37705205e33e29056e264d
Size
348KB
MD5
20e4eb0c6c37705205e33e29056e264d
SHA1
eb545af6ad03a05d2e4c26eb64740a2befbf7649
SHA256
6d69a6b17eff7f98e608be7e5f0ca2933ec52207bdc3b85033a24a34a688cc83
SHA512
9ddab9959b74f75ab66dbedb3cdad7875703c46eef509aae2c2ded82e45551c13f2a58e06f9ac8bdf64fc706a39f65c9259103a8599a04e81628060cc791c71b
SSDEEP
6144:DY9fkP4UahH82n6W1zxfz/5qSzHnQI1xXhWD8QqNhuAUq:5tGfr5qSzHrxXsUu9q
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCommandLineW
LoadLibraryA
GetProcAddress
CloseHandle
GetWindowsDirectoryW
lstrcatW
CreateFileW
VirtualAllocEx
LoadIconA
LoadCursorA
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ