Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
AacKingstonDramHal_x64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
AacKingstonDramHal_x64.exe
Resource
win10v2004-20230220-en
Target
AacKingstonDramHal_x64.exe
Size
616KB
MD5
a4d2df14de8b68078b3d45c22bc28c14
SHA1
e8b7ff8a26474cb25a19f3f87dece3414ace3018
SHA256
a6ffd673f891127e93c3262a9fdc5be15e98db3a12c1e58207ebf38ec9d6f979
SHA512
52414ff0ef5dd8399dc1000698515e90b39e1ba413a74a5d6ce26df41efbc39c8689391836a68772e615d0fe1070f0d8b080c7dcc61b66f2f0eb9f35943f7093
SSDEEP
12288:BBjXKvIa57yhLzO/R6NRSq3HdI6o1BfrIb91:XjXKvIa58Lz9NRSq3HdI66frI/
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CreateFileW
SetStdHandle
SetEndOfFile
WriteConsoleW
QueryPerformanceCounter
QueryPerformanceFrequency
GetFileSize
ResetEvent
CloseHandle
SetEvent
CreateFileA
CreateEventW
OutputDebugStringA
OutputDebugStringW
DeleteCriticalSection
DecodePointer
RaiseException
InitializeCriticalSectionEx
WideCharToMultiByte
MultiByteToWideChar
GetLastError
ReleaseMutex
WaitForSingleObject
CreateMutexW
FreeLibrary
GetSystemDirectoryW
GetModuleFileNameW
GetProcAddress
LoadLibraryW
HeapSize
Sleep
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlUnwindEx
RtlPcToFileHeader
ReadFile
ExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
WriteFile
HeapFree
HeapAlloc
GetFileType
SetFilePointerEx
GetConsoleMode
ReadConsoleW
RtlUnwind
GetMessageW
TranslateMessage
DispatchMessageW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExA
RegSetValueExW
RegQueryInfoKeyA
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SHCreateDirectoryExW
CoTaskMemFree
CoUninitialize
StringFromCLSID
CoRegisterClassObject
CoRevokeClassObject
CoInitializeEx
SafeArrayCreateVector
UnRegisterTypeLi
LoadTypeLi
LoadTypeLibEx
SysAllocString
SafeArrayUnaccessData
SafeArrayAccessData
VariantInit
SafeArrayPutElement
PathIsDirectoryW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ