Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
MSI APP Player.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
MSI APP Player.exe
Resource
win10v2004-20230220-en
Target
MSI APP Player.exe
Size
1.1MB
MD5
5570243405835e8f74dded31569a7662
SHA1
e8f45e855f9e6c3137f57e8fe1a0cc661eccb89a
SHA256
c5605d9911aa7c3308efe16370be500922f04189efe6389e13702181a6c44689
SHA512
d79b447a4d0d6b17a93924cf90fe6a37cdd86e9cd0dc0b754904b79e364635712cb521364f2f798a5c71b1e06bbe3e3d6c0b5272447ecabd38344214254012c4
SSDEEP
24576:+ivtCX8jElikZ3NzhXV0Oy5zCsP2/KzmwpSeqZUjAiH8KT0fEy:rtCX8ol9XxV07zCumRKny
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
SERIALNUMBER=4559077,CN=Bluestack Systems\, Inc,OU=Bluestack Systems\, Inc,O=Bluestack Systems\, Inc,L=Campbell,ST=California,C=US,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e
CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=US
CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US
SERIALNUMBER=4559077,CN=Bluestack Systems\, Inc,OU=Bluestack Systems\, Inc,O=Bluestack Systems\, Inc,L=Campbell,ST=California,C=US,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e
CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=US
CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryExW
GetModuleFileNameW
LocalFree
FormatMessageW
GetSystemDirectoryW
CloseHandle
SetFileTime
CreateFileW
SetFileAttributesW
RemoveDirectoryW
GetProcAddress
GetModuleHandleW
CreateDirectoryW
DeleteFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetTempPathW
SetLastError
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
FindClose
FindFirstFileW
FindNextFileW
GetModuleHandleA
GetFileAttributesW
GetFileSize
SetFilePointer
ReadFile
WriteFile
SetEndOfFile
GetProcessAffinityMask
GetCurrentProcess
GetSystemInfo
GlobalMemoryStatus
GetFileInformationByHandle
GetStdHandle
WaitForMultipleObjects
Sleep
VirtualAlloc
VirtualFree
GetVersionExW
lstrcatW
lstrlenW
WaitForSingleObject
CreateEventW
SetEvent
ResetEvent
InitializeCriticalSection
GetExitCodeProcess
CreateProcessW
GetCommandLineW
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LoadLibraryA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
ExitProcess
HeapCreate
RtlUnwind
RaiseException
HeapAlloc
HeapFree
HeapReAlloc
ExitThread
CreateThread
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
TerminateProcess
IsDebuggerPresent
DestroyWindow
LoadIconW
EndDialog
KillTimer
SetTimer
SetWindowTextW
PostMessageW
SendMessageW
MessageBoxW
DialogBoxParamW
GetWindowLongW
SetWindowLongW
ShowWindow
LoadStringW
CharUpperW
GetDlgItem
ShellExecuteExW
VariantClear
SysAllocStringLen
SysStringLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ