Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
bitvise-client.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bitvise-client.exe
Resource
win10v2004-20230220-en
Target
bitvise-client.exe
Size
20.8MB
MD5
116cd72fa1f152f526d0167593e29537
SHA1
6593034e4fda89d8b69c50f648673d47b1618939
SHA256
009e11f5e0c560e49527451fbdd0666c376a64e866b06668ad8c4d46fe53b370
SHA512
5eda62b75ed008161d187becfe4d3990f6b17c936460fa2bfdea73f96f85dafc1734b8f5355174529ea35a94be112c5daef89c4ed6e33d60a9eec58f2a4e5326
SSDEEP
393216:2o83OUxqg8aNrYovjjBQUlpgcR5PMEis2cfGItrga/uZj6oAYJsXx:2o8bxqgHh9vvXj/R5PMNA3tnuZ1sh
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SwitchToThread
GetModuleHandleExW
GetModuleFileNameW
GetFileAttributesW
CreateEventW
CreateMutexW
CreateThread
InterlockedExchange
ReleaseMutex
WaitForMultipleObjects
CompareStringW
GetModuleHandleA
GetSystemInfo
RtlCaptureStackBackTrace
FindFirstFileW
GetWindowsDirectoryW
FindClose
FindNextFileW
FoldStringW
LoadLibraryExW
GlobalLock
GlobalUnlock
GetTickCount
Sleep
lstrlenW
LocalAlloc
GetTempPathW
GetFullPathNameW
GetSystemTimeAsFileTime
QueryPerformanceCounter
ExpandEnvironmentStringsW
DeleteFileW
CreateDirectoryW
RemoveDirectoryW
CreateFileW
InterlockedCompareExchange
LoadResource
LockResource
SizeofResource
GetLongPathNameW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetExitCodeProcess
GetSystemWow64DirectoryW
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DuplicateHandle
MoveFileW
CopyFileW
OutputDebugStringW
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
InterlockedPushEntrySList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
RtlUnwind
GetConsoleMode
ExitThread
FreeLibraryAndExitThread
GetCommandLineA
HeapFree
HeapAlloc
GetStringTypeW
GetFileType
GetTimeZoneInformation
LCMapStringW
HeapSize
HeapReAlloc
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
SetStdHandle
GetConsoleCP
SetFilePointerEx
FlushFileBuffers
EncodePointer
SetEvent
CreateProcessW
ResetEvent
WaitForSingleObject
ExitProcess
CreateFileA
OutputDebugStringA
GetCurrentProcessId
GetModuleFileNameA
DebugBreak
IsDebuggerPresent
MultiByteToWideChar
WideCharToMultiByte
ReadFile
ReadConsoleW
WriteFile
WriteConsoleW
GetCurrentThreadId
GetOEMCP
GetACP
GetStdHandle
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
VerSetConditionMask
GetCurrentProcess
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FormatMessageW
InterlockedIncrement
InterlockedDecrement
SetFilePointer
MoveFileExW
GetFileSize
GlobalAlloc
GlobalFree
DeleteCriticalSection
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
LocalFree
GetLastError
SetLastError
CloseHandle
GetCommandLineW
GetModuleHandleW
FindResourceW
CreatePopupMenu
AppendMenuW
GetMessagePos
TrackPopupMenu
ExitWindowsEx
IsWindow
MessageBeep
GetDlgCtrlID
OffsetRect
DrawTextW
GetWindowTextW
GetWindowTextLengthW
ReleaseCapture
SetCapture
GetMessageTime
TrackMouseEvent
PtInRect
CreateWindowExW
FrameRect
IsWindowEnabled
RemovePropA
SetPropA
GetPropA
FillRect
LoadImageW
SetCursor
LoadCursorW
DestroyMenu
GetWindowThreadProcessId
MonitorFromRect
GetCursorPos
GetWindowPlacement
GetMonitorInfoW
GetParent
GetClientRect
ScreenToClient
CallWindowProcW
CloseClipboard
OpenClipboard
GetWindowDC
ReleaseDC
EndPaint
BeginPaint
MoveWindow
GetSysColor
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxA
wsprintfA
MessageBoxW
SendMessageTimeoutW
SetClipboardData
EmptyClipboard
GetMenuState
RemoveMenu
GetSystemMenu
DestroyWindow
CharLowerW
DialogBoxParamW
SendMessageW
SetWindowLongW
SetClassLongW
SystemParametersInfoW
AllowSetForegroundWindow
DestroyIcon
DialogBoxIndirectParamW
SetWindowPos
SetWindowTextW
GetDlgItem
CheckDlgButton
SetDlgItemTextW
SetFocus
MapDialogRect
GetSystemMetrics
InvalidateRect
GetWindowLongW
IsDlgButtonChecked
GetDlgItemTextW
EndDialog
EnableWindow
GetWindowRect
CreateFontIndirectW
DeleteObject
GetNearestColor
GetTextMetricsW
SetBkMode
SetTextColor
GetObjectW
GetTextExtentPoint32W
GetStockObject
SelectObject
CreateBitmapIndirect
CreateBrushIndirect
SHChangeNotify
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteW
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
CoUninitialize
CoInitializeEx
CoCreateInstance
SysAllocStringLen
SysStringLen
VariantClear
VariantInit
SysFreeString
PathIsPrefixW
GetModuleFileNameExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
LookupAccountSidW
InitializeSid
GetSidLengthRequired
OpenProcessToken
GetSidSubAuthority
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SetSecurityDescriptorControl
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
ConvertSidToStringSidW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ