Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
914d596563ae686977ebde1c0638ee007ae263e0ebf3503bbe4f53573e17a48d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
914d596563ae686977ebde1c0638ee007ae263e0ebf3503bbe4f53573e17a48d.exe
Resource
win10v2004-20240611-en
Target
914d596563ae686977ebde1c0638ee007ae263e0ebf3503bbe4f53573e17a48d
Size
290KB
MD5
d499509c2d5979d00a1515dd06950ff4
SHA1
cb5524fed523de5b058bfa84bbf4682a68113aa1
SHA256
914d596563ae686977ebde1c0638ee007ae263e0ebf3503bbe4f53573e17a48d
SHA512
d41b4eb0ab64f22e48584a4eb8fc4f5c0fa6ad40a393eb01ba71716402df5891e8099ec94eb5b12896e7939c2c83dc829086c15b23f58b5744f1a5c43611bf0a
SSDEEP
3072:w1TEzOZYorm73ga+WB9uN9kWxjwUci552HM81MI3pCWo2vsamd7A0CxOA:wVEKOgar3ufVxbXCs8qCv6c3j
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Projects\adminbyrequestdriver\interop\x64\Release\interop64.pdb
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
CreateEnvironmentBlock
LoadUserProfileW
CryptMsgClose
CertCloseStore
CryptMsgGetParam
CryptQueryObject
QueryFullProcessImageNameW
lstrcmpW
WriteFile
SetFilePointer
GetTempPathA
CreateFileA
GetLocalTime
ReadFile
GetBinaryTypeW
InitializeProcThreadAttributeList
CreateFileW
ResumeThread
GetLastError
UpdateProcThreadAttribute
GetNativeSystemInfo
DeleteProcThreadAttributeList
HeapAlloc
LocalSize
GetFileSize
VerSetConditionMask
GetProcessHeap
CreateProcessW
GetModuleHandleW
FreeLibrary
VerifyVersionInfoW
GetEnvironmentVariableW
lstrcpynW
SetLastError
HeapFree
HeapSize
CloseHandle
ExitProcess
TerminateProcess
GetExitCodeProcess
VirtualAllocEx
VirtualProtectEx
VirtualQueryEx
ReadProcessMemory
WriteProcessMemory
GetModuleHandleA
MultiByteToWideChar
HeapCreate
HeapDestroy
GetCurrentProcessId
GetCurrentThreadId
LoadLibraryExW
LCMapStringW
GetProcAddress
LoadLibraryA
OpenProcess
GetCurrentProcess
LocalFree
WaitForSingleObject
LocalAlloc
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
OutputDebugStringA
WriteConsoleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
HeapReAlloc
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
wsprintfW
LookupPrivilegeValueW
RevertToSelf
PrivilegeCheck
EqualSid
RegQueryValueExA
AllocateAndInitializeSid
SetEntriesInAclW
ImpersonateLoggedOnUser
CreateProcessAsUserW
GetLengthSid
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ