Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
agent.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
agent.exe
Resource
win10v2004-20240802-en
Target
agent.exe
Size
18.2MB
MD5
5c3408ee313f2265c5067b4edea77561
SHA1
0ba272cb053b53a1bede5665f5930b3b91957b93
SHA256
13ecca60324350098df183df0ffb07a8fb62ecf11416b22da15c38634fbc4098
SHA512
97a25ea1fbc927c009069aeeff67a7c586e0eb8c5d8189840cf259e7db032d40b16721cbd27b7c398bcc821b94e9e45d9b2a9e6d38f64b4314484a1581240407
SSDEEP
196608:PiTCfQ8VvtCd//QAD5z3L2fUHXsLGXLLaOQktYRZeEj9kI31Yg74eR3GBXlCCyA:PiTn8i0G3t1SB3Ca4ewH
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\Webhost\21-08-2024\WindowsBuilds\MYCOMPUTER_ACTIVEX\8939317\mycomp\mycomp\DesktopCentral\ZohoMeetingApp\Common\ZohoMeeting\VS2012Proj\Release\Agent.pdb
SizeofResource
HeapFree
InitializeCriticalSectionAndSpinCount
HeapSize
GetLastError
LockResource
HeapReAlloc
RaiseException
LoadResource
HeapAlloc
DecodePointer
HeapDestroy
GetProcessHeap
GetCurrentThreadId
DeleteCriticalSection
SetLastError
GetCurrentProcess
LocalAlloc
Sleep
SetEvent
GlobalAlloc
GlobalFree
CloseHandle
GetCurrentProcessId
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
TerminateProcess
FindClose
WaitForSingleObject
UnmapViewOfFile
ProcessIdToSessionId
MapViewOfFile
GetTickCount
InterlockedDecrement
WaitForMultipleObjects
InterlockedExchange
ResetEvent
InterlockedIncrement
GlobalLock
GlobalUnlock
ReadFile
WriteFile
SetFileTime
SetFilePointer
LocalFileTimeToFileTime
SystemTimeToFileTime
GetProcessId
ReleaseMutex
OpenProcess
GetExitCodeThread
SetUnhandledExceptionFilter
GetExitCodeProcess
WriteProcessMemory
GetCommandLineW
GetModuleHandleA
GetSystemPowerStatus
GetComputerNameExW
CreateThread
GetUserDefaultUILanguage
SetThreadExecutionState
FreeLibrary
SetHandleInformation
CreatePipe
PeekNamedPipe
IsDebuggerPresent
GetSystemTimes
GetProcessTimes
SetErrorMode
GetSystemInfo
LocalFree
VerSetConditionMask
VerifyVersionInfoW
GetDevicePowerState
SetProcessShutdownParameters
SetThreadPriority
GlobalMemoryStatus
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
GetCurrentThread
WTSGetActiveConsoleSessionId
GetStdHandle
ExitProcess
QueryPerformanceFrequency
QueryPerformanceCounter
GetTimeZoneInformation
FileTimeToSystemTime
LoadLibraryA
SystemTimeToTzSpecificLocalTime
FreeResource
ResumeThread
MulDiv
TryEnterCriticalSection
CreateFileA
FindFirstFileA
FindNextFileA
lstrlenA
lstrcatA
GetFileAttributesA
lstrcpyA
GlobalFlags
CreateTimerQueueTimer
DeleteTimerQueueEx
ChangeTimerQueueTimer
CreateTimerQueue
DeleteFileA
SetEndOfFile
GetLocalTime
GetFileSize
FlushFileBuffers
WaitForSingleObjectEx
GlobalSize
OutputDebugStringA
EncodePointer
GlobalDeleteAtom
lstrcmpA
ReleaseSemaphore
LockFile
UnlockFile
DuplicateHandle
GetThreadLocale
GetUserDefaultLCID
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetSystemDefaultUILanguage
VirtualProtect
FileTimeToLocalFileTime
GetFileSizeEx
GetFileTime
GetTickCount64
VirtualQuery
LoadLibraryExA
IsWow64Process
GetFileType
GetModuleHandleExW
GetSystemTimeAsFileTime
DeleteFiber
ConvertFiberToThread
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
CancelSynchronousIo
CancelIo
CreateNamedPipeW
DisconnectNamedPipe
GetOverlappedResult
ConnectNamedPipe
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
CreateProcessA
IsValidLocale
GetACP
HeapQueryInformation
ExitThread
GetFullPathNameA
SetStdHandle
GetCurrentDirectoryA
SetCurrentDirectoryA
SetEnvironmentVariableA
GetCommandLineA
SetConsoleCtrlHandler
MoveFileExW
GetConsoleCP
RtlUnwind
UnregisterWaitEx
VirtualFree
VirtualAlloc
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SignalObjectAndWait
FreeLibraryAndExitThread
GetThreadTimes
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
SetFilePointerEx
FindFirstFileExW
SwitchToThread
QueueUserWorkItem
GetOEMCP
VariantClear
SysAllocString
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
VarDateFromStr
GetErrorInfo
OleCreateFontIndirect
LoadTypeLi
VarBstrFromDate
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantChangeType
VariantInit
OleLoadPicture
URLDownloadToFileW
LsaConnectUntrusted
LsaLookupAuthenticationPackage
LsaDeregisterLogonProcess
BCryptGenRandom
??0DecoderEnum@@QAE@XZ
??1DecoderEnum@@QAE@XZ
??4DecoderEnum@@QAEAAV0@ABV0@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ