Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
f81c553661e8b0edf1d4a49cc8dcfa20N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f81c553661e8b0edf1d4a49cc8dcfa20N.exe
Resource
win10v2004-20240802-en
Target
f81c553661e8b0edf1d4a49cc8dcfa20N.exe
Size
384KB
MD5
f81c553661e8b0edf1d4a49cc8dcfa20
SHA1
2ae361e50f583345989fe8a1cf6d305eb7d051cd
SHA256
d79d620748709187501d12b218d8e878c8a40a95507e0f239d30d58c7ac68f73
SHA512
20cf227cbc063c166676ff258fcd51f707487f0c85b677e22a71613e07bf66f2e3b33b3557ff8f7747069ed333248b88ab1cc57981ad65b70ff52db4998f4039
SSDEEP
3072:5CagzJT+UdugGUkXybuD/jJyULiZZCZbSGld5e1jWYktGPYbw4I1f9tCpNZ4+fCv:5zgSgG1CbwyeaWUPYbWMbmDEf7Q
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\File_Transfer\09-Jul-19\rmp64\2362473\RMP_DBUILD\c_source\Remcom\Release\RemCom.pdb
WNetCancelConnection2W
WNetAddConnection2W
ExitThread
SetConsoleCursorPosition
FillConsoleOutputCharacterW
GetConsoleScreenBufferInfo
ReadFile
WaitForSingleObject
CreateProcessW
DeleteFileW
GetComputerNameW
SetConsoleCtrlHandler
GetCurrentProcessId
SetEndOfFile
CreateFileA
GetLocaleInfoW
HeapSize
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetConsoleTitleW
WaitNamedPipeW
Sleep
GetModuleHandleW
FindResourceW
LoadResource
LockResource
SizeofResource
GetCurrentDirectoryW
CreateFileW
WriteFile
CopyFileW
SetLastError
GetStdHandle
ReadConsoleW
GetConsoleMode
SetConsoleMode
HeapAlloc
GetProcessHeap
HeapFree
GetCurrentProcess
CloseHandle
GetLastError
FormatMessageW
LocalFree
GetFileAttributesW
CreateDirectoryW
GetCurrentThreadId
SetEnvironmentVariableA
CompareStringA
CompareStringW
GetTimeZoneInformation
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
GetModuleHandleA
ExitProcess
ResumeThread
CreateThread
RtlUnwind
GetVersionExA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
FatalAppExitA
VirtualAlloc
HeapReAlloc
WideCharToMultiByte
GetConsoleCP
FlushFileBuffers
GetModuleFileNameA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThread
RaiseException
SetHandleCount
GetFileType
GetStartupInfoA
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSection
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
QueryPerformanceCounter
GetTickCount
SetFilePointer
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
OpenDesktopW
OpenWindowStationW
CloseDesktop
GetUserObjectSecurity
SetUserObjectSecurity
GetProcessWindowStation
CloseWindowStation
SetProcessWindowStation
RegOpenKeyExW
RevertToSelf
RegConnectRegistryW
RegQueryValueExW
RegCloseKey
ControlService
QueryServiceStatus
ImpersonateLoggedOnUser
CreateProcessAsUserW
AddAccessAllowedAce
GetSecurityDescriptorDacl
GetAclInformation
InitializeAcl
GetAce
AddAce
LogonUserW
CreateProcessWithLogonW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenSCManagerW
OpenServiceW
CreateServiceW
CloseServiceHandle
StartServiceW
GetLengthSid
CopySid
OpenProcessToken
GetTokenInformation
EqualSid
FreeSid
AllocateAndInitializeSid
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ