Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3100ea97d65482e76ba6784cebf4591da888d9793709e7c6fd37939f8c781cbf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3100ea97d65482e76ba6784cebf4591da888d9793709e7c6fd37939f8c781cbf.exe
Resource
win10v2004-20221111-en
Target
3100ea97d65482e76ba6784cebf4591da888d9793709e7c6fd37939f8c781cbf
Size
164KB
MD5
1d0075866c50817ca87b1eac8976749b
SHA1
fe394186489b6595800c1131dcc45661a64da625
SHA256
3100ea97d65482e76ba6784cebf4591da888d9793709e7c6fd37939f8c781cbf
SHA512
0903d405db79b8bbf68b65a3a92939e10cf79651f67e14a919a6c832eb6ebc6941492cc006e007d3a17d9451b102a3008dc5953e50a0fbcef1596817c607f3be
SSDEEP
3072:WLa44TdtZbQOh4HALIWyG0KAnk4vcO9hzXSRNv:WLNGtZbf4HAL5fAnk4vcUV2v
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
ProbeForRead
__C_specific_handler
DbgPrint
ZwClose
ExFreePoolWithTag
ExAllocatePoolWithTag
IoCreateFile
RtlInitUnicodeString
ObOpenObjectByPointer
PsProcessType
IoGetCurrentProcess
PsGetVersion
IofCallDriver
ObfDereferenceObject
IoBuildDeviceIoControlRequest
KeInitializeEvent
IoGetDeviceObjectPointer
IofCompleteRequest
SeReleaseSubjectContext
SeTokenIsAdmin
SeCaptureSubjectContext
IoDeleteDevice
KeWaitForSingleObject
ProbeForWrite
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoFileObjectType
IoGetAttachedDevice
IoFreeIrp
KeSetEvent
IoAllocateIrp
IoGetBaseFileSystemDeviceObject
RtlCompareUnicodeString
MmIsAddressValid
ObQueryNameString
__chkstk
ZwQuerySystemInformation
ZwSetInformationObject
NtClose
ZwWaitForSingleObject
PsCreateSystemThread
KeUnstackDetachProcess
KeStackAttachProcess
PsLookupProcessByProcessId
RtlEqualUnicodeString
ZwDuplicateObject
PsGetCurrentProcessId
ZwOpenProcess
ExGetPreviousMode
IoCreateSymbolicLink
IoCreateDevice
MmUserProbeAddress
ObOpenObjectByName
ExAllocatePoolWithQuotaTag
SeDeleteObjectAuditAlarm
_stricmp
MmGetSystemRoutineAddress
ZwMapViewOfSection
ZwCreateSection
RtlCopyUnicodeString
ZwUnmapViewOfSection
ZwOpenKey
strncmp
KeBugCheckEx
NtBuildNumber
ExReleaseFastMutex
ExAcquireFastMutex
IoCheckEaBufferValidity
SeAppendPrivileges
SePrivilegeCheck
SeExports
ObfReferenceObject
KeDelayExecutionThread
IoQueryFileInformation
IoFreeMdl
IoCancelIrp
KeReadStateEvent
IoEnqueueIrp
KeClearEvent
MmProbeAndLockPages
ExRaiseStatus
IoAllocateMdl
ExEventObjectType
PsGetCurrentProcessWow64Process
RtlVolumeDeviceToDosName
ObCreateObject
SeSetAccessStateGenericMapping
RtlMapGenericMask
KeLeaveCriticalRegion
KeEnterCriticalRegion
ExQueueWorkItem
ObReferenceObjectByName
IoDriverObjectType
SeCaptureSecurityDescriptor
ZwOpenDirectoryObject
ZwOpenSymbolicLinkObject
ObReferenceObjectByPointer
IoDeviceObjectType
SeDeleteAccessState
ObInsertObject
SeCreateAccessState
IoAcquireVpbSpinLock
IoReleaseVpbSpinLock
distorm_decode64
distorm_version
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ