Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
fbd141d55fde4baa888872f87dc1a57654343de708917bf360cf8dec2c155ca9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fbd141d55fde4baa888872f87dc1a57654343de708917bf360cf8dec2c155ca9.exe
Resource
win10v2004-20221111-en
Target
fbd141d55fde4baa888872f87dc1a57654343de708917bf360cf8dec2c155ca9
Size
52KB
MD5
6b1112f3496c8f6c622c7ec9d58fea86
SHA1
46d89deaf7099adccc460d904a3a84035c257845
SHA256
fbd141d55fde4baa888872f87dc1a57654343de708917bf360cf8dec2c155ca9
SHA512
58bd68e0ba0d9b03d6aeef1098ae79d574c9f19ac88c8b42b0d46727f756893ae9ce3f380192f4ef41107e1b9649b0648630a2e525c0b8311694890c7adfc329
SSDEEP
768:hpH5VGMI/wCL9i6VKVLgngTQmv6o3Mf9SvG5wOJ:XZgMW8LWsQmny9SsV
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_stricmp
PsLookupProcessByProcessId
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
KeDelayExecutionThread
ExFreePool
ZwQueryValueKey
ZwOpenKey
ExAllocatePoolWithTag
strstr
ZwClose
ZwReadFile
ZwCreateFile
NtBuildNumber
PsTerminateSystemThread
InterlockedDecrement
InterlockedIncrement
PsCreateSystemThread
wcslen
IoCreateSymbolicLink
IoCreateDevice
wcscat
wcsrchr
ZwWriteFile
ZwQueryInformationFile
wcsstr
mbstowcs
strncpy
ExInitializeNPagedLookasideList
KeInitializeSpinLock
_wcsicmp
ObfDereferenceObject
ExInterlockedPushEntrySList
ExDeleteNPagedLookasideList
KeServiceDescriptorTable
ObReferenceObjectByHandle
ExGetPreviousMode
wcsncat
MmIsAddressValid
wcsncpy
ObQueryNameString
_except_handler3
_wcsnicmp
_wcslwr
ZwCreateKey
ZwEnumerateValueKey
ZwEnumerateKey
ZwDeleteValueKey
ZwDeleteKey
ZwSetValueKey
InterlockedExchange
ObReferenceObjectByName
IoDriverObjectType
IoFileObjectType
PsProcessType
MmGetSystemRoutineAddress
MmSystemRangeStart
IoGetDeviceObjectPointer
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
ObReferenceObjectByPointer
MmSectionObjectType
ZwQuerySystemInformation
RtlEqualUnicodeString
_strnicmp
IofCompleteRequest
wcscpy
IoGetCurrentProcess
ExInterlockedPopEntrySList
strncmp
KfReleaseSpinLock
KeRaiseIrqlToDpcLevel
KfLowerIrql
KfAcquireSpinLock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ