Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Target
bt_22.40.0_64_win10.exe
Size
12.3MB
MD5
ebc341aac97e46fa0f2872f7f2abb547
SHA1
32f8db33069b6f1edce7ca55ce3b51fc20ace58c
SHA256
75b74a8347d1a62ddef4b5fc0c237cde0b936aaf5007335ae3c668a6c49ac0e2
SHA512
ffdc38425e8a518c0bd4f89e26ab96dc7a45a5298e7787b12d70fc26782619991994d4a494571e51bc7c49892bbd908bff1fb37889e925e6a9d60b49a289524f
SSDEEP
196608:Ll4mOBrAWqFLmEB5AI+hCMFm97OvqsaAnd2/4A1pgU/QnRQmgll4FG:54mOnsLOIFMFm9av/aAI/nQnRlnG
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTempPathA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCurrentThreadId
CreateFileA
GetFileAttributesA
GetFileSize
SetFilePointer
CloseHandle
GetLastError
MapViewOfFileEx
UnmapViewOfFile
CreateFileMappingA
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
FlushFileBuffers
GetFileSizeEx
GetFileTime
ReadFile
RemoveDirectoryA
SetFileTime
WriteFile
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
GetModuleFileNameA
LoadResource
LockResource
SizeofResource
FindResourceA
GetCommandLineA
SetCurrentDirectoryA
OutputDebugStringA
Sleep
CreateThread
GetVersion
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
FreeLibrary
GetProcAddress
LoadLibraryExA
SetDefaultDllDirectories
GetSystemDefaultLangID
GetEnvironmentVariableA
CreateDirectoryA
GetTempFileNameA
GetTickCount
LocalAlloc
LocalFree
WriteConsoleW
HeapSize
CreateFileW
SetStdHandle
OutputDebugStringW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetTimeZoneInformation
SetConsoleCtrlHandler
HeapReAlloc
DeleteFileW
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleW
FormatMessageW
WideCharToMultiByte
MultiByteToWideChar
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
LoadLibraryExW
GetCommandLineW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
GetCurrentThread
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
ReadConsoleW
MoveFileExW
SetEndOfFile
EnableWindow
SendDlgItemMessageA
SetDlgItemTextA
GetDlgItem
CreateDialogParamA
MessageBoxA
IsWindow
PostQuitMessage
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
LoadStringA
DestroyWindow
SHGetSpecialFolderPathA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ