Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
pipelist64.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
pipelist64.exe
Resource
win10v2004-20240419-en
Target
pipelist64.exe
Size
228KB
MD5
bc652f22432756d0cb836a56ea3b3262
SHA1
5443a8b1f09e3a25dbd7d0619a9ff2f52a6042c1
SHA256
b892619af02bef2d138df82c29a72d2415140924d282c7024b841db360312611
SHA512
263da64870507c91950c2952d73a88056096b5d0200528aa0fcc97a06d1579076b0d65cc959efdab86ca225cfd95517b4d308e929929f7ee913758733e8d6867
SSDEEP
3072:mHSFuI+Yl91nPip0D8jV8XahTN2XME9LYOHzAj1975UFv/jkXh8hwDmK71GM+tEF:aSFuI+gfe6XyTN28AY7qvOvkri
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Builds\13810\Tools\pipelist_master\bin\x64\Release\pipelist64.pdb
VerQueryValueW
VerQueryValueA
GetFileVersionInfoW
GetFileVersionInfoA
GetFileVersionInfoSizeW
GetFileVersionInfoSizeA
GetLastError
CloseHandle
FormatMessageA
CreateFileA
GetTimeFormatW
GetDateFormatW
GetCommandLineW
OutputDebugStringW
ReadConsoleW
WriteConsoleW
SetFilePointerEx
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleHandleA
LoadLibraryA
GetStdHandle
LocalFree
LocalAlloc
GetModuleFileNameW
GetProcAddress
GetFileType
GetModuleFileNameA
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStringTypeW
PeekConsoleInputA
EnterCriticalSection
LeaveCriticalSection
SetStdHandle
HeapAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapFree
GetConsoleMode
GetNumberOfConsoleInputEvents
HeapSize
ReadConsoleInputA
SetConsoleMode
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
DeleteCriticalSection
FatalAppExitA
FlushFileBuffers
WriteFile
GetConsoleCP
RtlUnwindEx
ReadFile
GetStartupInfoW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
GetProcessHeap
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
GetCurrentThreadId
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
CreateFileW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadCursorA
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextA
GetDlgItem
EndDialog
DialogBoxIndirectParamA
SendMessageA
StartPage
EndDoc
StartDocA
SetMapMode
GetDeviceCaps
EndPage
PrintDlgA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
RegSetValueExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ