Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
Static task
static1
Behavioral task
behavioral1
Sample
d5a5d6567670ef56bbf2e88b29b63cd5ce0d205195516fefbaf69d4879582442.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d5a5d6567670ef56bbf2e88b29b63cd5ce0d205195516fefbaf69d4879582442.exe
Resource
win10v2004-20230703-en
Target
d5a5d6567670ef56bbf2e88b29b63cd5ce0d205195516fefbaf69d4879582442
Size
34KB
MD5
26fc2e3f34eb7bd586867284bf4345a8
SHA1
7d6ea620f64bff2ded9359ae8f5158861168a84e
SHA256
d5a5d6567670ef56bbf2e88b29b63cd5ce0d205195516fefbaf69d4879582442
SHA512
9c3beae20e511d7588a957e595f114968549f1d7097891fe69dc6accd47d897c7e90819d6199de04f021c451d636bfdad414279f2618b384d7cbe5903bac5a14
SSDEEP
768:ZTddRNlf7ecy3ueGUhLWSOLKwHPnOmlj4zHDul8sY+Zyfd3G:76WPn50R+Zy1W
ExtKeyUsageCodeSigning
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
MmIsAddressValid
RtlInitAnsiString
MmGetSystemRoutineAddress
RtlAnsiStringToUnicodeString
RtlCompareUnicodeString
RtlEqualUnicodeString
RtlFreeUnicodeString
ExAllocatePool
ExAllocatePoolWithTag
ExFreePoolWithTag
PsTerminateSystemThread
ObfDereferenceObject
ZwCreateFile
ZwQuerySystemInformation
PsLoadedModuleList
KeGetCurrentIrql
KeInitializeEvent
KeSetEvent
KeWaitForSingleObject
IoAllocateIrp
IofCallDriver
IoCreateFile
IoFreeIrp
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
ObReferenceObjectByHandleWithTag
ObCloseHandle
IoCreateFileEx
MmFlushImageSection
ZwDeleteFile
IoFileObjectType
KeLowerIrql
KfRaiseIrql
IofCompleteRequest
IoGetDeviceObjectPointer
ObReferenceObjectByName
IoDriverObjectType
RtlGetVersion
KeBugCheck
RtlCompareMemory
ZwClose
ProbeForRead
ProbeForWrite
MmBuildMdlForNonPagedPool
MmMapLockedPages
MmProtectMdlSystemAddress
MmMapLockedPagesSpecifyCache
MmUnmapLockedPages
MmAllocatePagesForMdlEx
IoAllocateMdl
IoFreeMdl
ZwOpenFile
ZwCreateSection
ZwOpenSection
ZwMapViewOfSection
ZwUnmapViewOfSection
ZwTerminateProcess
NtAllocateVirtualMemory
ObOpenObjectByPointer
ZwAllocateVirtualMemory
PsGetProcessWow64Process
PsGetProcessPeb
__C_specific_handler
strcmp
atoi
KeStackAttachProcess
RtlCopyUnicodeString
DbgPrintEx
IoGetCurrentProcess
RtlInitUnicodeString
PsLookupProcessByProcessId
KeUnstackDetachProcess
KeDelayExecutionThread
WdfVersionUnbindClass
WdfVersionBindClass
WdfVersionUnbind
WdfLdrQueryInterface
WdfVersionBind
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ