Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
05fe660a4accc522b6e31e72d0566c6f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05fe660a4accc522b6e31e72d0566c6f.exe
Resource
win10v2004-20231215-en
Target
05fe660a4accc522b6e31e72d0566c6f
Size
13KB
MD5
05fe660a4accc522b6e31e72d0566c6f
SHA1
76d0e3aee2af89c70ecf77ceaf577170890df95c
SHA256
4d733c4d745648f84f8297db56621f0e463f8f830e53c8a875bc560c609168bc
SHA512
672243896a83d98bf96c660a54614ed8526bec5e79dd40057baa6f6c5dbc074107b4fbc76e9e657c87573cb210690f3665ecca7bd27e8ab0503cf6b0281d14de
SSDEEP
192:1vt7gcrSOtdFc4C+KMVVqW6ZVzNH204PAWJmgtmm:p9hm4C+IvKSgv
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetWindowsDirectoryA
lstrlenA
lstrcpyA
CreateFileA
GetModuleHandleA
GetProcAddress
lstrcmpi
FlushConsoleInputBuffer
lstrcpynW
WritePrivateProfileSectionW
GlobalSize
GetProcessTimes
GetCPInfoExW
GetConsoleDisplayMode
SetConsoleCursorInfo
GetNumberFormatA
ReadFileEx
LoadIconA
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ