Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
prompt8x.exe
Resource
win10v2004-20221111-en
Target
prompt8x.exe
Size
839KB
MD5
83accd37185a1027367ce44e01b5c816
SHA1
9764bd4791a58ffc092e231d4044d318925c324c
SHA256
5e97838b41a63fddd489b4efd85cf90dcb4f195ce50a7eb87f0a4c6ba312f5e3
SHA512
6f8701de763f4c3c3f218800ce62be6fc1dcc96e0a089e3e79f112f467484d94fa0bb009fd3df558c481034313a71b6ded452b65edf42fce528ba12af14de44f
SSDEEP
12288:9O3R9UUv6AfAIoNR55Bq9E+lt5/E75vcudY6Ib3k1/uRffNxUA:w3Rejtq9E+lbaVIb01/SXNCA
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
ExFreePoolWithTag
RtlTimeToSecondsSince1970
ZwReadFile
RtlInitUnicodeString
swprintf
ZwSetInformationFile
KeDelayExecutionThread
ZwWaitForSingleObject
ZwCreateFile
ZwQueryDirectoryFile
PsGetCurrentThreadId
ZwOpenFile
ZwQueryInformationFile
ZwWriteFile
IoFileObjectType
ZwClose
ObReferenceObjectByHandle
ObfDereferenceObject
IoQueryFileDosDeviceName
DbgPrint
PsCreateSystemThread
ZwConnectPort
ZwCreateEvent
ExReleaseFastMutex
ExAcquireFastMutex
KeInitializeEvent
LpcPortObjectType
LpcRequestPort
ZwSetEvent
ZwCreateSection
ZwFsControlFile
ZwCancelIoFile
ZwWaitForMultipleObjects
RtlUnicodeStringToAnsiString
ZwSetValueKey
ZwQueryValueKey
RtlxUnicodeStringToAnsiSize
NlsMbOemCodePageTag
ZwOpenKey
_stricmp
MmIsAddressValid
PsSetCreateProcessNotifyRoutine
IofCompleteRequest
KeWaitForSingleObject
KeSetEvent
IoCreateFile
IoFreeMdl
IoAllocateMdl
RtlAnsiStringToUnicodeString
ExInitializeNPagedLookasideList
ExpInterlockedPushEntrySList
ExpInterlockedPopEntrySList
ExSystemTimeToLocalTime
PsTerminateSystemThread
_vsnprintf
ExQueryDepthSList
RtlTimeToTimeFields
PsThreadType
ExInterlockedRemoveHeadList
PsGetCurrentProcessId
KeWaitForMultipleObjects
ExDeleteNPagedLookasideList
PsLookupProcessByProcessId
ExGetPreviousMode
ZwQuerySystemInformation
KeUnstackDetachProcess
ExAllocatePoolWithTag
PsGetProcessId
KeStackAttachProcess
ProbeForRead
ObOpenObjectByPointer
MmSectionObjectType
_wcsicmp
IoThreadToProcess
PsProcessType
PsGetProcessImageFileName
KeInitializeApc
KeInsertQueueApc
PsGetThreadId
IoGetCurrentProcess
ZwQueryInformationProcess
ZwTerminateProcess
ZwQueryInformationThread
PsLookupThreadByThreadId
RtlxAnsiStringToUnicodeSize
MmProbeAndLockPages
isspace
_wcsnicmp
isdigit
isupper
RtlGetVersion
MmUserProbeAddress
ExAcquireResourceExclusiveLite
KeLeaveCriticalRegion
ZwMapViewOfSection
MmHighestUserAddress
RtlSetBits
RtlInitializeBitMap
KeEnterCriticalRegion
MmMapViewInSystemSpace
ZwUnmapViewOfSection
RtlAreBitsSet
ExAcquireResourceSharedLite
ExReleaseResourceLite
RtlClearAllBits
MmUnmapViewInSystemSpace
ExDeleteResourceLite
ExInitializeResourceLite
RtlFindNextForwardRunClear
RtlClearBits
KeInitializeMutex
MmFreeMappingAddress
KeReleaseMutex
MmMapLockedPagesWithReservedMapping
MmAllocateMappingAddress
MmUnmapReservedMapping
MmUnlockPages
strchr
MmGetSystemRoutineAddress
atoi
_snprintf
strncpy
ZwFreeVirtualMemory
ZwSetInformationThread
RtlRandom
ZwAllocateVirtualMemory
ZwSetTimer
ZwCreateTimer
ZwCancelTimer
sprintf
strncmp
ExEventObjectType
MmUnmapLockedPages
IoDeleteSymbolicLink
PsRemoveCreateThreadNotifyRoutine
IoDeleteDevice
PsSetCreateThreadNotifyRoutine
MmMapLockedPagesSpecifyCache
ZwSetInformationProcess
IoCreateSymbolicLink
IoCreateDevice
ExSetTimerResolution
strrchr
ZwOpenEvent
wcsrchr
_itoa
RtlCaptureContext
ProbeForWrite
ZwYieldExecution
qsort
strstr
RtlSecondsSince1970ToTime
__C_specific_handler
KeQueryPerformanceCounter
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ