Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
204d8a58d9cb9c7c603d92a75c660b40ae027d9ed8c39051f46dbc97b38807f1.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
204d8a58d9cb9c7c603d92a75c660b40ae027d9ed8c39051f46dbc97b38807f1.exe
Resource
win10v2004-20230703-en
Target
204d8a58d9cb9c7c603d92a75c660b40ae027d9ed8c39051f46dbc97b38807f1
Size
256KB
MD5
e986d1eb38c4bc0e512210587bee0d59
SHA1
99e6497d75eb9789d704e5048d15839c6a56074f
SHA256
204d8a58d9cb9c7c603d92a75c660b40ae027d9ed8c39051f46dbc97b38807f1
SHA512
ec3f4be17ca71b7665d4588aebc26dc0d5dfd4d1ad12c806dcaec8b9aa194e1f2a4e927f0f2517fdda5f9d8660d2dace92de49a0af527b33a078de1495072920
SSDEEP
3072:83RTVYySu0DBIQrSHJuY6njz4XEswPTrPTbNVdX:8zYySJp5jz4XE7/PT3dX
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RtlInitUnicodeString
ExAllocatePoolWithTag
ProbeForRead
ExFreePoolWithTag
KeServiceDescriptorTable
RtlImageNtHeader
ZwClose
ObReferenceObjectByHandle
ObfDereferenceObject
ZwOpenKey
PsLookupProcessByProcessId
KeUnstackDetachProcess
LdrAccessResource
KeStackAttachProcess
LdrFindResource_U
IoDeleteDevice
IoFreeMdl
SeReleaseSubjectContext
SeCaptureSubjectContext
IofCompleteRequest
MmProbeAndLockPages
MmUnlockPages
IoCreateSymbolicLink
PsGetCurrentProcessId
IoCreateDevice
SeTokenIsAdmin
IoAllocateMdl
IoDeleteSymbolicLink
IoFileObjectType
ZwUnmapViewOfSection
KeGetCurrentThread
ZwAllocateVirtualMemory
IoGetCurrentProcess
ZwFreeVirtualMemory
ExEventObjectType
MmCreateSection
NtClose
KeClearEvent
PsProcessType
MmMapViewOfSection
IoGetBaseFileSystemDeviceObject
KeWaitForSingleObject
IoFreeIrp
_wcsnicmp
IoGetRelatedDeviceObject
IoAllocateIrp
ZwMapViewOfSection
KeSetEvent
ExGetPreviousMode
ProbeForWrite
ObfReferenceObject
IoCreateFile
KeInitializeEvent
ZwCreateSection
MmHighestUserAddress
ObInsertObject
ExAllocatePoolWithQuotaTag
ObOpenObjectByPointer
ZwQuerySymbolicLinkObject
_stricmp
wcsncpy
ZwOpenSymbolicLinkObject
IoGetDeviceObjectPointer
IoGetDeviceAttachmentBaseRef
KeBugCheckEx
IoCreateFileSpecifyDeviceObjectHint
RtlCompareUnicodeString
RtlCompareMemory
ZwOpenFile
ZwQueryObject
ObQueryNameString
ZwQueryValueKey
MmGetSystemRoutineAddress
ZwQuerySystemInformation
PsGetVersion
ZwSetValueKey
_strnicmp
ZwReadFile
ZwSetInformationFile
ZwQueryInformationFile
RtlEqualUnicodeString
ZwWaitForSingleObject
PsCreateSystemThread
ZwDuplicateObject
ZwOpenProcess
ZwSetInformationObject
ExDeleteNPagedLookasideList
InterlockedPushEntrySList
ExInitializeNPagedLookasideList
InterlockedPopEntrySList
MmUserProbeAddress
KeAddSystemServiceTable
wcschr
RtlVolumeDeviceToDosName
ZwCreateEvent
memmove
ZwQueryDirectoryFile
ZwQueryInformationProcess
RtlAnsiStringToUnicodeString
strrchr
_vsnwprintf
wcsrchr
SeDeleteObjectAuditAlarm
RtlImageDirectoryEntryToData
PsGetProcessSectionBaseAddress
MmIsAddressValid
_except_handler3
memset
memcpy
KeGetCurrentIrql
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ