Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
14fa0b7894f76d0ce4b42a01b33784cf39272a42b1dcf08c3f9b771ea16abb0f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
14fa0b7894f76d0ce4b42a01b33784cf39272a42b1dcf08c3f9b771ea16abb0f.exe
Resource
win10v2004-20220812-en
Target
14fa0b7894f76d0ce4b42a01b33784cf39272a42b1dcf08c3f9b771ea16abb0f
Size
333KB
MD5
25e34b21ed2b5223bb43d41fd180b3c7
SHA1
25c9fe8b42a7f6cfb34b8fca26ee3e8123e7e3be
SHA256
14fa0b7894f76d0ce4b42a01b33784cf39272a42b1dcf08c3f9b771ea16abb0f
SHA512
8d614a97725a7c2dba0f62f862a1cd86c029c6e52bf2be0bf0045ae1614410ba8698ae922ec26271cad4a88d107e49a57f3f85b5887c0bd02512eaf2f06dbb5e
SSDEEP
6144:2div0YrQOEFR22Lz/J8qb5bPRvjRTuO2ElZI8lHfSsxnagTKFF3bgf5n41:2di8kQDR2K8wbDTuO2ElZz73Tmdp
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryExA
ReadFile
VirtualAllocEx
CloseHandle
CopyFileW
CreateFileW
CreateProcessW
CreateThread
DeleteFileW
ExitProcess
ExpandEnvironmentStringsW
FileTimeToDosDateTime
FileTimeToLocalFileTime
FormatMessageA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapFree
LocalAlloc
LocalFree
QueryPerformanceCounter
SetCurrentDirectoryA
SetErrorMode
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
LoadIconA
GetSysColor
LoadCursorA
memset
_XcptFilter
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_ftol
_initterm
_ltow
_wcslwr
_wfopen
_wfullpath
_wsplitpath
exit
fclose
floor
fwprintf
swprintf
wcsncpy
wcsstr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ