Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
ac84a5b98cb4741b52b9e45a6b8df7efb0b767e38c1894034e27f4d51f6d0001N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ac84a5b98cb4741b52b9e45a6b8df7efb0b767e38c1894034e27f4d51f6d0001N.exe
Resource
win10v2004-20241007-en
Target
ac84a5b98cb4741b52b9e45a6b8df7efb0b767e38c1894034e27f4d51f6d0001N
Size
83KB
MD5
17ff4e0994da20d76e6ede1abab85b80
SHA1
cb1cf01b15f249cc2471747762af9dc751fe8775
SHA256
ac84a5b98cb4741b52b9e45a6b8df7efb0b767e38c1894034e27f4d51f6d0001
SHA512
0ac807d1a2e5a0ce4ee5ba01cbb33eb40f02a9e74b1130c1a96b19f45b5d2ee76f324d924fc7debadb92323fd31a08f172524be458e2f047ab659a39e7c3398d
SSDEEP
1536:3ATwUIilyrdCo2HSa/8zr1XkImF2jbxWGq6iltAvF:wTwUIzr0fPIS2jbxWGqNltAd
ExtKeyUsageCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
GetDriveTypeW
GetTickCount
LoadIconW
LoadCursorA
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ