Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
sdelete64.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sdelete64.exe
Resource
win10v2004-20240426-en
Target
sdelete64.exe
Size
240KB
MD5
2b5cb081721b8ba454713119be062491
SHA1
7bcd946326b67f806b3db4595ede9fbdf29d0c36
SHA256
feec1457836a5f84291215a2a003fcde674e7e422df8c4ed6fe5bb3b679cdc87
SHA512
413c1ef210c97cbded7728bc609f9641dc16be53bd6e0242e9cba01af90a3d5abc3dbafa9ef75e3370b23bfdd895d3d45195dfaf9cbdb44a37f37190f8233522
SSDEEP
3072:iIwYaZhWTnvoCuhKLaOKqoSRTrTR1KGqS4iKk5UFyrTZSRSPsxSveo+iYYqh:iIwYaZhsnO9OKIRTrTRo5p/y4GZ8
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\agent\_work\5\s\x64\Release\Sdelete64.pdb
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
WaitForSingleObject
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
FindClose
CloseHandle
GetTickCount
FormatMessageW
ExpandEnvironmentStringsW
GetCurrentDirectoryW
GetDiskFreeSpaceW
RemoveDirectoryW
GetFullPathNameW
CreateFileW
GetLastError
GetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
MoveFileW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
OutputDebugStringW
ReadConsoleW
WriteConsoleW
SetFilePointerEx
HeapReAlloc
VirtualFree
VirtualAlloc
GetVersion
GetCommandLineW
GetModuleHandleW
GetStdHandle
LoadLibraryW
LocalAlloc
LocalFree
GetProcAddress
GetModuleFileNameW
GetFileType
GetTimeFormatW
CompareStringW
LCMapStringW
SetFileAttributesW
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
HeapSize
HeapAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapFree
GetConsoleMode
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ReadConsoleInputA
SetConsoleMode
GetStringTypeW
DeleteCriticalSection
FatalAppExitA
FlushFileBuffers
GetConsoleCP
RtlUnwindEx
IsDebuggerPresent
IsProcessorFeaturePresent
GetStartupInfoW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
GetCurrentThreadId
GetProcessHeap
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadCursorW
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextW
GetDlgItem
EndDialog
DialogBoxIndirectParamW
SendMessageW
StartPage
EndDoc
StartDocW
SetMapMode
GetDeviceCaps
EndPage
PrintDlgW
CryptAcquireContextW
RegSetValueExW
RegQueryValueExW
RegOpenKeyW
RegCreateKeyW
RegCloseKey
CryptGenRandom
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ