Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
bc77f210640f3efdceb202dcf8421652.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc77f210640f3efdceb202dcf8421652.exe
Resource
win10v2004-20240226-en
Target
bc77f210640f3efdceb202dcf8421652
Size
159KB
MD5
bc77f210640f3efdceb202dcf8421652
SHA1
9fdcc072b17b81fa821f65f19318a38fbaf05832
SHA256
b1a50fd6ecfd96bd7476e5b796fb0cda5eb5fd8004717c4c9ef6ba0e5c29f40d
SHA512
196a5ce3aec51aa46df3d5fefb749cd4debee65de0e1d358edb492b872a025afc9eba10d1c56c3e1a499dfd9d7d754bd396344d17e63b18858ed77bd9fc8fe86
SSDEEP
3072:tz8qB8b+YWRzy5T9/Uj2Q5C2APy1LofKkcf1JcwQe9uJ21t7MTP3:tz8Tb+JRzy5TFUjB0PPy1LaXM16k9ukY
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
G:\MyProject\StreetPlayer\ExtraProgram\DropTarget\x64\Release_EXE\DTDrop64.pdb
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
WaitForSingleObject
LoadResource
SizeofResource
CloseHandle
CreateEventW
HeapDestroy
GetModuleHandleW
GetCommandLineW
FindResourceW
FindResourceExW
GetTempPathW
DeleteFileW
MultiByteToWideChar
WideCharToMultiByte
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
GlobalFree
GlobalUnlock
GlobalLock
GetProcAddress
LockResource
GetModuleFileNameW
DecodePointer
LCMapStringW
GetStringTypeW
LoadLibraryExW
WriteConsoleW
SetEndOfFile
SetStdHandle
GetCPInfo
GetOEMCP
FlushFileBuffers
EncodePointer
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
IsProcessorFeaturePresent
CreateFileW
GetFileType
ReadFile
GetConsoleMode
ReadConsoleW
WriteFile
GetConsoleCP
SetFilePointerEx
SetLastError
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
GetStdHandle
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsValidCodePage
GetACP
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
CoResumeClassObjects
CoRegisterClassObject
CoInitializeEx
CoUninitialize
CoRevokeClassObject
CoAddRefServerProcess
CLSIDFromString
CoReleaseServerProcess
ShellExecuteW
DragQueryFileW
SysFreeString
SysAllocString
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ