Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
31f36a89880ec4d5a9757f39dea5fb9a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
31f36a89880ec4d5a9757f39dea5fb9a.exe
Resource
win10v2004-20231215-en
Target
31f36a89880ec4d5a9757f39dea5fb9a
Size
45KB
MD5
31f36a89880ec4d5a9757f39dea5fb9a
SHA1
f20acc8a08a5649983cb2661ccb54c24d9677c70
SHA256
17c78be68ff2291d42556e3199a6159f81a6cad0f55b87a55e8c2439b5322da2
SHA512
6a51be830f64efdd703a21693c51d67f69390832b99f7da290470184548f4855dcdf9e4c3498a45b644d475a754766fc70cd5db61b030009ae93ab22831a68c3
SSDEEP
768:yrKPDHKzKKUtYlnNBoGMkqx3qo6q6fCv2FZMXC5Hf5L/tesPKBP:yr6DYUiPoGq9qBq6fC0MXCl5hXK9
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
FileTimeToDosDateTime
lstrcatA
GetProcAddress
LoadLibraryW
GetCommandLineA
CreateFileA
FindNextFileW
GetConsoleAliasExesA
ProcessIdToSessionId
QueueUserAPC
SetComputerNameExA
lstrcmpW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ