Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
VSSrv460266.exe
Resource
win7-20220901-es
Behavioral task
behavioral2
Sample
VSSrv460266.exe
Resource
win10v2004-20221111-es
Target
VSSrv460266.exe
Size
616KB
MD5
6166abd27ef18e5d9def814f5ffeedec
SHA1
2c4a99439eb5388e8e6788c66b1b86eb3fda60b5
SHA256
f3326ebe2106e5f9672aceeda05167111fa48052808405b81913acdc0a2710a0
SHA512
d7e34870b75472a4b982de2f6104f84f77ef1c698890bfed438763fbb7f65eb3ef8d169002797f5f6bedd1e1ebcd16f5da49d537f5a417f0dbea6dbdaf4e57ea
SSDEEP
12288:6MmlUbFPVvl2fC8cu3G/otPiI8Gj6xtlXYZXpPmQ/0xMzQT5avuJZZA7a7NjbfC:6MmYFPdl2qOumPl846xtdYX1KaqsvaZ6
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentThreadId
SuspendThread
OpenMutexA
CreateMutexA
ReleaseMutex
OpenEventA
IsBadReadPtr
CreateProcessA
FileTimeToDosDateTime
DosDateTimeToFileTime
SetFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
HeapAlloc
HeapFree
GetProcessHeap
GetSystemInfo
WriteProcessMemory
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
VirtualQuery
GetShortPathNameA
GetVolumeInformationA
GetFileInformationByHandle
WideCharToMultiByte
ReadProcessMemory
Module32First
CreateToolhelp32Snapshot
Module32Next
DuplicateHandle
FileTimeToSystemTime
GetSystemTime
FindFirstFileW
GetLongPathNameA
FindNextFileW
SetFilePointer
GetTempPathA
VirtualFree
VirtualAlloc
GetVersion
MultiByteToWideChar
GetThreadLocale
GetStartupInfoA
GetLocaleInfoA
GetCommandLineA
ExitProcess
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
lstrlenW
lstrlenA
lstrcpyW
lstrcpyA
lstrcmpiA
lstrcmpA
LocalAlloc
VirtualQueryEx
VirtualProtectEx
VirtualProtect
SetLastError
ReleaseSemaphore
OpenMutexW
OpenFileMappingW
OpenFileMappingA
OpenEventW
LoadLibraryExA
GetWindowsDirectoryW
GetThreadContext
GetSystemDirectoryW
GetModuleFileNameW
GetFileAttributesW
GetExitCodeThread
GetCurrentThread
GetCurrentDirectoryW
GetCurrentDirectoryA
InterlockedIncrement
FormatMessageA
ExitThread
CreateSemaphoreA
CreateProcessW
CreatePipe
CreateMutexW
CreateFileMappingW
SystemTimeToFileTime
ExpandEnvironmentStringsA
GetVersionExA
AreFileApisANSI
SetErrorMode
DeleteFileW
RemoveDirectoryW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetTimeZoneInformation
SetFileAttributesA
MoveFileExA
GetModuleHandleA
InterlockedExchange
InterlockedCompareExchange
GetComputerNameA
GetLogicalDriveStringsA
GetFileSize
TerminateProcess
VerifyVersionInfoA
GetFileAttributesA
LocalFree
WriteFile
ReadFile
GetOverlappedResult
SetNamedPipeHandleState
WaitNamedPipeA
ConnectNamedPipe
CreateNamedPipeA
CancelIo
DisconnectNamedPipe
LoadLibraryW
CreateFileW
GetVersionExW
GetModuleHandleW
GetProcAddress
CreateEventW
DeleteFileA
GetNativeSystemInfo
VerSetConditionMask
VerifyVersionInfoW
ProcessIdToSessionId
WaitForMultipleObjects
GetLastError
ResumeThread
SetThreadPriority
TerminateThread
GetModuleFileNameA
DeviceIoControl
GetSystemDirectoryA
QueryDosDeviceA
FindNextFileA
LoadLibraryA
FindClose
CopyFileA
FindFirstFileA
ResetEvent
GetCurrentProcess
QueryDosDeviceW
EnterCriticalSection
LeaveCriticalSection
CreateFileA
GetCurrentProcessId
Sleep
OpenProcess
GetTickCount
WaitForSingleObject
DeleteCriticalSection
SetEvent
CloseHandle
CreateEventA
InitializeCriticalSection
GetLocaleInfoW
SetStdHandle
GetConsoleOutputCP
GetEnvironmentVariableA
GetLocalTime
CreateDirectoryA
RemoveDirectoryA
GetFullPathNameA
WriteConsoleA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
CreateThread
lstrcatW
FreeLibrary
FlushInstructionCache
GetWindowsDirectoryA
GetFileTime
InterlockedDecrement
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapReAlloc
WriteConsoleW
GetFileType
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
HeapCreate
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeFormatA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
CharUpperA
GetCursorPos
CloseDesktop
DispatchMessageA
GetThreadDesktop
GetUserObjectInformationA
MsgWaitForMultipleObjects
OpenInputDesktop
PeekMessageA
TranslateMessage
MessageBoxA
GetKeyboardType
CharLowerA
EnumWindows
PostMessageA
GetWindowThreadProcessId
ConvertStringSecurityDescriptorToSecurityDescriptorA
CloseServiceHandle
GetKernelObjectSecurity
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyW
GetUserNameA
RegQueryInfoKeyA
EqualSid
GetTokenInformation
GetNamedSecurityInfoA
GetLengthSid
SetFileSecurityA
FreeSid
IsValidSid
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeAcl
SetEntriesInAclA
RegDeleteKeyA
ControlService
SetServiceStatus
QueryServiceStatus
StartServiceA
CreateServiceA
StartServiceCtrlDispatcherA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
OpenServiceA
SetNamedSecurityInfoA
GetSecurityDescriptorSacl
SetSecurityInfo
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExW
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegSetValueExW
AdjustTokenPrivileges
LookupPrivilegeValueA
CreateProcessAsUserW
OpenProcessToken
RegCloseKey
RegOpenKeyA
RegQueryValueExA
DeleteService
OpenSCManagerA
RegisterServiceCtrlHandlerExA
CoInitializeSecurity
CoSetProxyBlanket
CoInitialize
CoInitializeEx
CoCreateInstance
CoUninitialize
CoTaskMemFree
SysAllocStringLen
SysReAllocStringLen
SysFreeString
VariantInit
VariantClear
SysStringLen
FilterConnectCommunicationPort
FilterSendMessage
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ