Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
Static task
static1
Target
313e0c8056ce05214825cfa2e6b99d18530f0532878df0f6e9e920d49e41d16f
Size
596KB
MD5
09fb14f31d0a0839253fc96cddae8e7c
SHA1
4a28778f77f3416527a2938a1f759cbf351cf648
SHA256
313e0c8056ce05214825cfa2e6b99d18530f0532878df0f6e9e920d49e41d16f
SHA512
002deb62a2c004e1a53756809c56014e13a556238d9420c082f45dc9746b914de3bd95fe762f1cf70326797bc3e2881f725fa1211a475976dca4db94d2f3f35b
SSDEEP
6144:dQcHlXLLSIN8HQfQ84a4bsXqLcoFurTd7u8q3v9OfmCQAO1I+H6bNwX7Gy82BPkO:dQa8QoSnQvMTVu82Et+19+kPkjK
ExtKeyUsageCodeSigning
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
FltUnregisterFilter
FltStartFiltering
FltGetFileNameInformation
FltRegisterFilter
FltEnumerateFilters
FltGetFilterInformation
FltReleaseFileNameInformation
FltGetFileNameInformationUnsafe
FltParseFileName
ExAllocatePoolWithTag
ExFreePoolWithTag
MmGetSystemRoutineAddress
PsCreateSystemThread
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
IoGetCurrentProcess
IoRegisterShutdownNotification
IoUnregisterShutdownNotification
EtwRegister
EtwUnregister
EtwWriteTransfer
ObfReferenceObject
ObfDereferenceObject
ZwClose
ZwOpenKey
RtlGetVersion
RtlUpcaseUnicodeString
MmGetPhysicalAddress
MmIsAddressValid
PsSetLoadImageNotifyRoutine
ZwOpenProcess
PsLookupProcessByProcessId
PsLookupThreadByThreadId
ObOpenObjectByPointer
ZwDuplicateObject
ZwQueryInformationProcess
ZwOpenThread
ObReferenceObjectByName
__C_specific_handler
PsProcessType
IoDriverObjectType
InitSafeBootMode
KeBugCheckEx
RtlAppendUnicodeToString
RtlCopyUnicodeString
RtlInitUnicodeString
_wcsicmp
wcsrchr
KeSetPriorityThread
RtlEnumerateGenericTableAvl
KeInitializeEvent
ExAcquireFastMutex
ExReleaseFastMutex
RtlCompareUnicodeString
RtlFreeUnicodeString
ExAllocatePool
MmUnlockPages
IoFreeMdl
KeStackAttachProcess
KeUnstackDetachProcess
ZwQuerySystemInformation
ObReferenceObjectByHandleWithTag
ObfDereferenceObjectWithTag
ZwOpenFile
ZwCreateSection
ZwOpenSection
ZwMapViewOfSection
ZwUnmapViewOfSection
RtlRunOnceInitialize
RtlRunOnceBeginInitialize
RtlRunOnceComplete
PsGetCurrentProcessId
ObMakeTemporaryObject
ZwQuerySecurityObject
RtlImageNtHeader
ZwQuerySection
RtlImageDirectoryEntryToData
PsInitialSystemProcess
wcscpy_s
KeEnterCriticalRegion
KeLeaveCriticalRegion
ExAcquireRundownProtection
ExAcquireRundownProtectionEx
ExReleaseRundownProtection
ExReleaseRundownProtectionEx
CmUnRegisterCallback
PsTerminateSystemThread
IoIs32bitProcess
ObUnRegisterCallbacks
PsSetCreateProcessNotifyRoutine
PsSetCreateProcessNotifyRoutineEx
PsRemoveCreateThreadNotifyRoutine
PsRemoveLoadImageNotifyRoutine
vsprintf_s
PsThreadType
ExDesktopObjectType
vDbgPrintExWithPrefix
PsGetThreadId
PsGetThreadProcessId
KeNumberProcessors
KeAcquireSpinLockRaiseToDpc
KeReleaseSpinLock
ExInitializeResourceLite
ExDeleteResourceLite
wcsstr
wcsnlen
RtlEqualUnicodeString
ProbeForRead
PsGetCurrentThreadTeb
wcsncat_s
KeSetEvent
KeWaitForSingleObject
ExRaiseStatus
IoAllocateIrp
IofCallDriver
IoCreateFile
IoFreeIrp
ObReferenceObjectByHandle
ZwCreateFile
ZwQueryInformationFile
ZwSetInformationFile
ZwReadFile
ZwWriteFile
ZwOpenSymbolicLinkObject
ZwQuerySymbolicLinkObject
IoGetFileObjectGenericMapping
ZwDeleteFile
ObCreateObject
SeCreateAccessState
IoFileObjectType
MmMapIoSpace
MmUnmapIoSpace
ZwQueryVirtualMemory
KeClearEvent
ExAllocatePoolWithQuotaTag
ExGetPreviousMode
ObCloseHandle
PsGetProcessId
SeLocateProcessImageName
PsGetThreadProcess
ObInsertObject
PsReferenceProcessFilePointer
ZwFlushInstructionCache
MmUserProbeAddress
ZwCreateKey
ZwDeleteKey
ZwSetValueKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ