Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
a88b96ee70c6efb4e57c4843c1e61940N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a88b96ee70c6efb4e57c4843c1e61940N.exe
Resource
win10v2004-20240802-en
Target
a88b96ee70c6efb4e57c4843c1e61940N.exe
Size
998KB
MD5
a88b96ee70c6efb4e57c4843c1e61940
SHA1
ec864383c2d48f1528e1e8f386c4f41ea8e120de
SHA256
7a5f87077188afa8f613d00da8340bf63d7959f378490673357363ca11694b83
SHA512
cd5f001e44ddd0ed26da7815fa6badf97a6b09687a5e648c0b7c32b341640c9febdc16698eb35e6c5fddce2e4a9fe2f4528509d6be3ac69aade30de550b016e3
SSDEEP
12288:bYS638vQCpyhMf8CIWgKvJgG1aqNg3hZ1CuB0BBROutotgklqVCXBZDgoa8ewoU:9vfpxaK57UP1CuB0bROut+lnDqCoU
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\dat\DVC\RtCmd\x64\release\rtcmd.pdb
NtDeleteKey
NtQueryObject
ZwDuplicateObject
NtQuerySystemInformation
NtLoadKey2
NtUnloadKey
NtEnumerateValueKey
NtCreateKey
LdrUnloadDll
RtlFindMessage
LdrLoadDll
RtlNtStatusToDosError
ZwFsControlFile
ZwOpenProcessTokenEx
ZwQueryDirectoryFile
NtQuerySymbolicLinkObject
ZwQueryInformationToken
NtOpenSymbolicLinkObject
RtlConvertSidToUnicodeString
NtQueryDirectoryObject
NtClose
NtOpenDirectoryObject
RtlInitUnicodeString
ZwQueryInformationFile
RtlGetVersion
NtDeleteValueKey
NtSetValueKey
ZwSetInformationFile
ZwCreateFile
NtOpenKey
RtlLengthSecurityDescriptor
ZwQuerySecurityObject
ZwSetSecurityObject
RtlValidSecurityDescriptor
NtEnumerateKey
NtQueryValueKey
SetErrorMode
GetVolumeInformationW
HeapFree
SetCurrentDirectoryW
FileTimeToSystemTime
GetFullPathNameW
CreateEventW
GetSystemInfo
ResetEvent
FindFirstFileW
LocalFree
CreateNamedPipeW
ConnectNamedPipe
Sleep
SetEvent
WaitForMultipleObjectsEx
SetConsoleOutputCP
GetComputerNameW
ExitProcess
lstrcmpiW
FindClose
GetCurrentProcess
WaitForSingleObject
LeaveCriticalSection
GetLogicalDrives
CloseHandle
HeapReAlloc
TerminateThread
SetEndOfFile
DosDateTimeToFileTime
GetOverlappedResult
GetFileAttributesW
DeviceIoControl
GetComputerNameExW
ReadConsoleW
ReadConsoleInputW
SetConsoleCursorPosition
WriteConsoleOutputCharacterW
GetSystemTime
CreateDirectoryW
FileTimeToDosDateTime
GetDiskFreeSpaceW
DefineDosDeviceW
GetVolumeNameForVolumeMountPointW
SetVolumeMountPointW
DeleteVolumeMountPointW
QueryDosDeviceW
CopyFileW
RaiseException
RemoveDirectoryW
lstrlenW
lstrcpyW
MoveFileW
VirtualAlloc
VirtualFree
GetTickCount
lstrcmpiA
LoadLibraryW
SetFilePointerEx
SetFileApisToANSI
SetThreadExecutionState
GetLocaleInfoW
CompareFileTime
GetFirmwareEnvironmentVariableW
GetVolumePathNameW
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
GetFileType
TerminateProcess
FreeLibrary
QueryPerformanceCounter
SetThreadPriority
GetCommandLineW
CreateThread
GetCurrentDirectoryW
SetFilePointer
GetDiskFreeSpaceExW
GetConsoleOutputCP
ReadFile
SetLastError
GetConsoleScreenBufferInfo
SetConsoleMode
WriteFile
GetConsoleMode
HeapAlloc
GetModuleFileNameW
EnterCriticalSection
GetStdHandle
GetProcAddress
InitializeCriticalSection
GetModuleHandleW
CompareStringA
lstrcmpW
CreateFileW
CompareStringW
MoveFileExW
GetTimeFormatW
GetCurrentThreadId
GetEnvironmentVariableW
GetDriveTypeW
GetDateFormatW
GetLastError
ExpandEnvironmentStringsW
GetProcessHeap
GetFileInformationByHandle
GetSystemTimeAsFileTime
WideCharToMultiByte
FileTimeToLocalFileTime
LocalFileTimeToFileTime
MultiByteToWideChar
LocalAlloc
LoadLibraryA
SetFileAttributesW
SetFileTime
SendMessageTimeoutA
SendInput
GetKeyboardLayoutNameW
UnregisterClassW
DestroyWindow
DispatchMessageW
GetMessageW
SetTimer
CreateWindowExW
RegisterClassExW
PostQuitMessage
PostMessageW
CharLowerA
wsprintfA
wsprintfW
wvsprintfW
MessageBoxW
GetForegroundWindow
CharLowerW
CharUpperW
CharUpperA
GetSecurityDescriptorLength
DeleteAce
OpenEncryptedFileRawW
ConvertStringSidToSidA
GetSecurityDescriptorGroup
QueryServiceStatusEx
ChangeServiceConfig2W
CreateServiceW
DeleteService
ControlService
ChangeServiceConfigW
StartServiceW
AddAce
CreateWellKnownSid
GetCurrentHwProfileW
LookupAccountNameW
CryptSignHashW
ReadEncryptedFileRaw
RegCreateKeyExW
RegSaveKeyExW
RegCreateKeyW
RegOpenKeyExW
RegFlushKey
CloseServiceHandle
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
RegReplaceKeyW
CryptGetKeyParam
RevertToSelf
ImpersonateLoggedOnUser
LogonUserW
CryptGetUserKey
DecryptFileW
EncryptFileW
FreeEncryptionCertificateHashList
EqualSid
GetSecurityDescriptorOwner
GetAclInformation
GetLengthSid
IsValidSid
GetKernelObjectSecurity
GetSecurityDescriptorDacl
SetKernelObjectSecurity
GetAce
SetFileSecurityW
CryptDestroyHash
CryptVerifySignatureW
CryptImportKey
CloseEncryptedFileRaw
ConvertSecurityDescriptorToStringSecurityDescriptorW
IsValidSecurityDescriptor
OpenProcessToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorControl
LookupPrivilegeValueW
InitializeAcl
AdjustTokenPrivileges
SetNamedSecurityInfoW
CryptAcquireContextW
CryptEncrypt
CryptReleaseContext
CryptDestroyKey
CryptGenKey
CryptCreateHash
CryptHashData
RegCloseKey
CryptExportKey
CryptDecrypt
AddUsersToEncryptedFile
QueryUsersOnEncryptedFile
RemoveUsersFromEncryptedFile
WriteEncryptedFileRaw
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ