Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
livekd64.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
livekd64.exe
Resource
win10v2004-20230915-en
Target
livekd64.exe
Size
603KB
MD5
789e183ea5b0b0189e4e5430f442a809
SHA1
781eaf9b532b573fc5929baf06fdfccc4df6e23f
SHA256
f86dc0891dfec0063e8d4927600863773086249ea95fd10249b0208c2940a261
SHA512
a457506bef64d2c044fd25d6e939929072a70aab2035650f460ceac25b94ed346a65f291cd9db24287b01e9f058e001fb5799f33b09b2765fc04ec089362de22
SSDEEP
12288:wmH2iOL6NiZJX8o+5nfvPMQ9HG2E7vQW5iIyr:wXL7bX8o+5nfvPMQ9HlkvQW5iXr
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetFileVersionInfoSizeW
GetFileVersionInfoA
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeA
WriteFile
GetTempPathW
CreateFileW
DeleteFileW
TerminateProcess
TerminateThread
WriteProcessMemory
ResumeThread
WaitForSingleObject
GetModuleFileNameW
CreateProcessW
SetCurrentDirectoryW
FreeLibrary
LoadLibraryW
GlobalMemoryStatusEx
OpenProcess
GetEnvironmentStrings
ReadProcessMemory
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
DeviceIoControl
SetEndOfFile
SetFilePointerEx
GetSystemInfo
FormatMessageA
CreateEventA
GetModuleFileNameA
GetComputerNameW
GetStartupInfoA
GetEnvironmentVariableA
GetEnvironmentVariableW
SetEnvironmentVariableA
ExpandEnvironmentStringsA
GetSystemDirectoryA
GetWindowsDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetFullPathNameA
SetFileAttributesA
DeleteFileA
SearchPathA
GetVersionExA
MultiByteToWideChar
SetConsoleCtrlHandler
CreateToolhelp32Snapshot
Process32First
Process32Next
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExW
FindFirstFileExA
GetModuleHandleW
Sleep
GetProcessHeap
HeapFree
HeapAlloc
CreateFileMappingA
GetSystemTimeAsFileTime
MapViewOfFile
UnmapViewOfFile
RtlUnwind
GetFileSizeEx
CreateFileA
FindResourceA
CloseHandle
SizeofResource
LoadResource
SetLastError
GetLastError
GetCurrentProcess
LockResource
GetCommandLineW
GetModuleHandleA
LoadLibraryA
GetStdHandle
GetFileType
LocalFree
LocalAlloc
GetProcAddress
WriteConsoleW
ReadFile
ReadConsoleW
HeapSize
HeapReAlloc
CreateProcessA
FindClose
CreateThread
WaitForSingleObjectEx
OutputDebugStringW
OutputDebugStringA
FlushFileBuffers
GetStringTypeW
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
ExitProcess
GetModuleHandleExW
GetConsoleMode
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ReadConsoleInputA
SetConsoleMode
WideCharToMultiByte
GetCommandLineA
GetACP
GetCurrentThread
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
SendMessageA
DialogBoxIndirectParamA
EndDialog
GetDlgItem
LoadCursorA
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextA
StartPage
EndDoc
StartDocA
SetMapMode
GetDeviceCaps
EndPage
PrintDlgA
RegCloseKey
RegOpenKeyExW
FreeSid
AllocateAndInitializeSid
EqualSid
GetTokenInformation
StartServiceA
QueryServiceStatus
OpenServiceW
OpenSCManagerA
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
RegDeleteKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
CoUninitialize
CoCreateInstance
CoInitializeEx
VariantClear
VariantInit
SysStringByteLen
SysFreeString
SysAllocString
VariantChangeType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ