Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Target
DotNetZip-ypoornsy.tmp
Size
1.0MB
MD5
5c97baf4d9ebc52de33427315912e1de
SHA1
a23d5b68edb6afe3bcc04baccd7397a976956068
SHA256
5f2ed738c46701a4f8b0f405f5bbdf219849049198cf4a0673a53a618dd47e8a
SHA512
b573f999dc9777ba7014309c61e7f5bfe8e3bf8f00c5634ba6051588b9e533ff7f4cbad5b40464bd99820ca83ba44bab0aee014034326598900dd204ae95f43e
SSDEEP
12288:4/rdqLPGsshdMGsXM2C5DWXZYOqvpogiL+hJpNXb++qzDtT4Z0bh1Ebta3Ak/Gnu:4/rATGEXpOkUyt7eRe3qiA1W
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
c:\Work\CURRENT\ALT_ETW\bin\ALT\x64\Release\PDB\perfmod64.pdb
WaitNamedPipeW
FlushFileBuffers
lstrlenW
GetModuleFileNameW
OpenFileMappingW
FreeEnvironmentStringsW
UnmapViewOfFile
OpenProcess
CreateToolhelp32Snapshot
ProcessIdToSessionId
Process32NextW
Process32FirstW
LoadLibraryW
FreeLibrary
QueryFullProcessImageNameW
MapViewOfFile
GetEnvironmentStringsW
HeapFree
HeapSize
HeapReAlloc
RaiseException
HeapAlloc
DecodePointer
GetProcessHeap
WideCharToMultiByte
ReleaseMutex
ReadProcessMemory
GetVersion
LocalAlloc
SetLastError
GetModuleHandleA
ExitThread
FlushInstructionCache
VirtualProtect
VirtualFree
CreateFileMappingA
VirtualQuery
VirtualAlloc
VirtualAllocEx
VirtualQueryEx
DuplicateHandle
GetThreadContext
GetVersionExW
CreateMutexW
CreateFileMappingW
lstrlenA
GetTickCount
lstrcatA
lstrcpyA
GetModuleFileNameA
ReadFile
ResetEvent
TerminateProcess
ExitProcess
ReadConsoleW
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
FindClose
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
GetFileSizeEx
GetFileType
GetStdHandle
GetModuleHandleExW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InterlockedFlushSList
RtlPcToFileHeader
RtlUnwind
RtlUnwindEx
InitializeSListHead
GetSystemTimeAsFileTime
GetCommandLineA
GetModuleHandleW
GetCurrentProcessId
DeleteCriticalSection
LocalFree
GetProcAddress
CreateThread
CloseHandle
SetEvent
OutputDebugStringW
GetFileAttributesExW
GetLastError
GetTickCount64
Sleep
MultiByteToWideChar
CreateEventW
DisconnectNamedPipe
GetCurrentThreadId
CreateFileW
WaitForSingleObject
InitializeCriticalSectionEx
InitializeCriticalSection
LeaveCriticalSection
K32GetModuleFileNameExW
OutputDebugStringA
WriteFile
GetCurrentProcess
GetCommandLineW
EnterCriticalSection
GetFileInformationByHandleEx
SetNamedPipeHandleState
SetEnvironmentVariableW
SetStdHandle
WriteConsoleW
SetEndOfFile
QueryPerformanceCounter
GetStartupInfoW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
GetStringTypeW
CompareStringEx
EncodePointer
LCMapStringEx
GetCPInfo
GetLocaleInfoEx
InitializeCriticalSectionAndSpinCount
GetParent
SendMessageTimeoutW
SetTimer
wsprintfW
KillTimer
RegisterWindowMessageW
IsWindowVisible
SendMessageW
CallNextHookEx
IsWindow
UnhookWindowsHookEx
FindWindowW
GetClassNameW
SetWindowsHookExW
PostThreadMessageW
GetDesktopWindow
GetClassNameA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
AllocateAndInitializeSid
FreeSid
GetTokenInformation
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
RegCloseKey
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
CommandLineToArgvW
CoCreateFreeThreadedMarshaler
CoTaskMemFree
VariantClear
SysStringLen
VariantInit
SysFreeString
SysAllocString
PathFindFileNameW
RegisterLogger
UnregisterLogger
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ