Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
pipelist64.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
pipelist64.exe
Resource
win10v2004-20231023-en
Target
pipelist64.exe
Size
431KB
MD5
e794ca9cc2af5f555ca573ace7fbde00
SHA1
9f7cd59b08e2a4f810c68745a26b633c685bd7de
SHA256
c7c3e2e7b729891141f5a7cb172390e57072783187edc92db95d4b7b7fe8cc4c
SHA512
7de6e6b81df65ded8c2779051e5a677de0e6db390ae1ea3abb5c9deffc3f7a3a54012c88e2573c83f4d3c83e54210126b4bc95127dd2ce4bd970ee818b77b1f1
SSDEEP
6144:EXaCBWflr+fDPiOOQ14h0WRKIqLZRto+hLhLlw7X8A0YfvaJXW7gUNBhtBxLVug:EKcCEfDkRKIqLZRto+hFl0XZH7HLl
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
VerQueryValueW
VerQueryValueA
GetFileVersionInfoW
GetFileVersionInfoA
GetFileVersionInfoSizeW
GetFileVersionInfoSizeA
GetModuleHandleA
GetCommandLineW
GetLastError
CloseHandle
FormatMessageA
CreateFileA
GetProcessHeap
GetStringTypeW
GetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
LocalFree
LocalAlloc
GetProcAddress
GetVersionExA
LoadLibraryExA
GetModuleFileNameW
SetLastError
GetFileType
GetModuleFileNameA
SetConsoleCtrlHandler
SetFilePointerEx
WriteConsoleW
ReadConsoleW
HeapSize
HeapReAlloc
SetEnvironmentVariableW
InterlockedPushEntrySList
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
RtlUnwind
InterlockedFlushSList
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
SetStdHandle
ExitProcess
GetModuleHandleExW
GetConsoleMode
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ReadConsoleInputA
SetConsoleMode
WriteFile
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetACP
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetCurrentThread
FlushFileBuffers
GetConsoleCP
ReadFile
CreateFileW
OutputDebugStringA
OutputDebugStringW
WaitForSingleObjectEx
CreateThread
FindClose
FindFirstFileExA
FindFirstFileExW
LoadCursorA
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextA
GetDlgItem
EndDialog
DialogBoxIndirectParamA
SendMessageA
StartPage
EndDoc
StartDocA
SetMapMode
GetDeviceCaps
EndPage
PrintDlgA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
RegSetValueExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ