Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Static task
static1
Target
93a21c265422810e137bd0831c49d4391f30bddd06f438aa780be1c16fa4a732
Size
689KB
MD5
cf9ae6177471612cb917f9df6fc58daa
SHA1
aa0fa379468a2fb3e72d129402fa48f04e6d7c22
SHA256
93a21c265422810e137bd0831c49d4391f30bddd06f438aa780be1c16fa4a732
SHA512
80aefc84c720990811f6ac141b68574d6d5e9a5bf148eb78a318a8b4b309d91b5c64733c0cef2a628b94454b493cc07fa963a89ba845d3d890e4f569550553a5
SSDEEP
12288:YgAHIa2cprm2wQboirolWgEAAREeuUyJRr89T+1p24CDFhJFU3sMtFa:WoTcc2wJiro0D/9uRUGpMDC3TFa
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
memmove
_stricmp
strstr
wcscpy_s
wcsstr
RtlInitAnsiString
RtlInitUnicodeString
RtlWriteRegistryValue
RtlAnsiStringToUnicodeString
RtlUnicodeStringToAnsiString
RtlFreeUnicodeString
RtlFreeAnsiString
DbgPrint
RtlTimeToTimeFields
RtlGetVersion
KeDelayExecutionThread
KeWaitForSingleObject
KeBugCheckEx
ExAllocatePool
ExAllocatePoolWithTag
ExFreePoolWithTag
ExSystemTimeToLocalTime
ExCreateCallback
ExRegisterCallback
ExUnregisterCallback
MmBuildMdlForNonPagedPool
MmGetSystemRoutineAddress
MmMapLockedPagesSpecifyCache
PsCreateSystemThread
PsTerminateSystemThread
IoAllocateMdl
IoFreeMdl
towlower
ObReferenceObjectByHandle
ObfDereferenceObject
ZwCreateFile
ZwOpenFile
ZwQueryInformationFile
ZwReadFile
ZwWriteFile
ZwClose
ZwCreateKey
ZwOpenKey
ZwDeleteKey
ZwEnumerateKey
ZwQueryValueKey
ZwSetValueKey
MmIsAddressValid
PsSetCreateProcessNotifyRoutineEx
IoCreateFileSpecifyDeviceObjectHint
KeStackAttachProcess
KeUnstackDetachProcess
PsLookupProcessByProcessId
ZwDeleteFile
ZwQueryDirectoryFile
ZwAllocateVirtualMemory
PsGetProcessImageFileName
_allmul
memcpy
memset
RtlCompareUnicodeString
PsGetProcessPeb
KeServiceDescriptorTable
RtlUnwind
IoGetCurrentProcess
tolower
ExAllocatePool
NtQuerySystemInformation
ExFreePoolWithTag
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
KeQueryActiveProcessors
KeSetSystemAffinityThread
KeRevertToUserAffinityThread
DbgPrint
_except_handler3
KeGetCurrentIrql
KeQueryPerformanceCounter
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ