Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
pservice.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
pservice.exe
Resource
win10v2004-20240426-en
Target
pservice.zip
Size
133KB
MD5
fb6fddacadfac39e48212c14903d5e86
SHA1
04462f58f566496fad808fb84bf04db8f0266c98
SHA256
b39bba438c58408bc93d8c30f48b4662089c2aac4b44c085f2ba9529c4b93964
SHA512
6ac2c38e364d52e7082aaa249d600bbb515ed2ece889272686eebb203ec253f9cf4009cacdd2b850d5fd3faf494cf0772fc5f599d058e4e4dfbb2f7f22eea461
SSDEEP
3072:zt2GscClikaxLEtUiGAESP4Kz5vLFbOKEQr5QQah49mO6LZxk:z7scClikaxg1pP4m5v8fQ229R61xk
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
DeleteFileW
FindClose
FindNextFileW
CopyFileW
MoveFileExW
MultiByteToWideChar
WideCharToMultiByte
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeConditionVariable
WakeConditionVariable
SleepConditionVariableCS
WaitForSingleObject
CreateThread
GetCurrentThreadId
QueryPerformanceCounter
SetWaitableTimerEx
CreateWaitableTimerW
SetLastError
GetFileType
ExitProcess
TerminateProcess
GetModuleHandleExW
HeapAlloc
RtlCaptureContext
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
IsProcessorFeaturePresent
HeapFree
GetStartupInfoW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
LoadLibraryExW
CompareStringW
LCMapStringW
GetFileAttributesExW
HeapReAlloc
GetConsoleOutputCP
SetFilePointerEx
SetStdHandle
HeapSize
GetProcessHeap
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
FlushFileBuffers
WriteConsoleW
RaiseException
InitializeSListHead
GetCommandLineA
RtlPcToFileHeader
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
RtlUnwindEx
GetConsoleMode
FreeLibrary
CreateProcessW
SetUnhandledExceptionFilter
GetStdHandle
GetEnvironmentStringsW
GetModuleHandleW
GetCurrentProcessId
GetProcAddress
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetCurrentProcess
FindFirstFileExW
GetCommandLineW
GetExitCodeProcess
ConnectNamedPipe
QueryFullProcessImageNameW
WTSGetActiveConsoleSessionId
Process32FirstW
Process32NextW
GetLastError
ProcessIdToSessionId
CreateToolhelp32Snapshot
OpenProcess
DisconnectNamedPipe
GetNamedPipeClientProcessId
CreateNamedPipeW
WriteFile
CallNamedPipeW
ReadFile
CloseHandle
CreateFileW
RtlLookupFunctionEntry
GetModuleFileNameW
PathFileExistsW
SHGetKnownFolderPath
RegQueryValueExW
ReportEventW
RegisterEventSourceW
DuplicateTokenEx
StartServiceCtrlDispatcherW
CreateProcessAsUserW
RegOpenKeyExW
InitializeSecurityDescriptor
OpenProcessToken
RegSetValueExW
SetServiceStatus
SetTokenInformation
RegCloseKey
SetSecurityDescriptorDacl
RegisterServiceCtrlHandlerExW
DeregisterEventSource
RegDeleteValueW
WTSQuerySessionInformationW
WTSEnumerateSessionsW
WTSFreeMemory
CryptBinaryToStringW
CertFreeCertificateContext
ord224
CoTaskMemFree
SendSAS
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ