Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
ReAgent.dll
Resource
win10v2004-20240426-en
Target
ReAgent.dll
Size
899KB
MD5
a802a4f481186c3fe8c480d2aa9425d0
SHA1
9390ddcf51fea47de82f308886e4fb4a15c95e91
SHA256
4657d2fedeb5951bb63805147ea3a20e01fb8eb38fa0183e4cd862328f60a0a6
SHA512
aab0461bec004b04a2603f2641cfaee6b2ae057e97ed9900bf98afbfc835cdf3244a8095c0608ee1ad87ae83cfbc9ea2a2e291533833f702ae87918bd6c36617
SSDEEP
12288:76G+/gf5cIjijbeCjSaYSmwNyUVzqUMWQHpX2cfg+BhLPqFRqnqtWk2360htoAD3:7wYSmwNh5Mttg+BhLPq7qnYjet7V9gwN
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReAgent.pdb
atol
_vsnwprintf
wcschr
_wcsicmp
__CxxFrameHandler3
_purecall
_atoi64
memcmp
memcpy
memmove
_onexit
__dllonexit
_unlock
_lock
_except_handler4_common
_vsnprintf
wcsrchr
??0exception@@QAE@ABV0@@Z
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
_wtoi64
_CxxThrowException
_amsg_exit
_XcptFilter
_callnewh
malloc
swscanf_s
wcsncmp
wcsnlen
wcsstr
memcpy_s
_wcslwr
qsort
towupper
strcpy_s
_wcsupr
wcstoul
_strcmpi
memmove_s
iswspace
wcscpy_s
wcscat_s
swprintf_s
_ultow_s
_vsnwprintf_s
_snwscanf_s
strncmp
wprintf
_vscwprintf
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_wcsnicmp
_initterm
free
memset
ZwQuerySystemInformation
RtlFreeUnicodeString
RtlStringFromGUID
ZwWaitForSingleObject
ZwQueryKey
ZwReleaseMutant
ZwOpenFile
ZwOpenMutant
ZwClose
RtlAppendUnicodeToString
ZwQueryAttributesFile
RtlLengthSecurityDescriptor
RtlSetOwnerSecurityDescriptor
RtlSetDaclSecurityDescriptor
ZwCreateKey
ZwLoadKey
RtlAddAccessAllowedAceEx
RtlAllocateAndInitializeSid
RtlLengthSid
ZwDeleteValueKey
RtlFreeSid
ZwDeleteKey
ZwEnumerateKey
ZwQueryValueKey
RtlCreateAcl
ZwSetSecurityObject
ZwUnloadKey
RtlCreateSecurityDescriptor
ZwSetValueKey
ZwOpenKey
ZwAllocateUuids
LdrGetProcedureAddress
LdrGetDllHandle
ZwQueryInformationProcess
NtQuerySystemInformation
ZwQueryInformationFile
ZwOpenProcess
ZwQuerySymbolicLinkObject
ZwDeviceIoControlFile
ZwOpenSymbolicLinkObject
RtlGetVersion
NtAdjustPrivilegesToken
NtOpenProcessTokenEx
NtSetInformationThread
NtOpenThreadTokenEx
NtOpenSymbolicLinkObject
NtOpenKey
NtQuerySymbolicLinkObject
NtDeviceIoControlFile
NtQueryValueKey
NtQueryBootEntryOrder
NtQueryBootOptions
NtTranslateFilePath
NtOpenDirectoryObject
NtQueryDirectoryObject
NtEnumerateBootEntries
RtlCompareMemory
NtYieldExecution
RtlInitAnsiString
RtlInitializeCriticalSection
RtlNtStatusToDosError
RtlGUIDFromString
RtlRaiseStatus
NtClose
RtlInitUnicodeString
RtlAdjustPrivilege
RtlFreeHeap
RtlGetLastNtStatus
RtlDeleteCriticalSection
RtlReAllocateHeap
DbgPrintEx
RtlDeleteResource
RtlReleaseResource
RtlAcquireResourceShared
RtlAcquireResourceExclusive
RtlInitializeResource
RtlImpersonateSelf
NtSetEaFile
NtCreateFile
NtSetInformationFile
NtQueryInformationProcess
NtQueryInformationFile
NtQueryVolumeInformationFile
RtlAllocateHeap
NtOpenFile
RtlDosPathNameToNtPathName_U
NtSetSecurityObject
RtlFindAceByType
RtlSetControlSecurityDescriptor
ExpandEnvironmentStringsW
GetCurrentDirectoryW
GetLongPathNameW
GetLastError
SetLastError
GetProcessHeap
HeapFree
TlsGetValue
HeapAlloc
GetSystemDirectoryW
CreateFileW
CloseHandle
GetFileAttributesExW
GetVolumeNameForVolumeMountPointW
DeviceIoControl
FindFirstVolumeW
GetDriveTypeW
GetDiskFreeSpaceExW
FindNextVolumeW
FindVolumeClose
GetFileAttributesW
GetFullPathNameW
GetVolumePathNameW
MultiByteToWideChar
GetFileSize
ReadFile
SetEndOfFile
MoveFileExW
SetFileAttributesW
DeleteFileW
RemoveDirectoryW
CopyFileW
GetVersionExW
GetSystemWindowsDirectoryW
GetWindowsDirectoryW
GetTempPathW
CreateDirectoryW
GetFileSizeEx
GetModuleHandleW
GetProcAddress
GetTickCount64
CompareStringW
FindFirstFileW
FindNextFileW
FindClose
GetVolumePathNamesForVolumeNameW
WaitForSingleObject
WritePrivateProfileStringW
GetPrivateProfileStringW
GetFileInformationByHandle
SetFirmwareEnvironmentVariableW
LoadLibraryExW
FreeLibrary
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetFirmwareEnvironmentVariableW
GetModuleHandleExW
GetHandleInformation
SetFilePointerEx
GetEnvironmentVariableW
GetOverlappedResult
EnterCriticalSection
SleepConditionVariableSRW
VirtualProtect
FlushFileBuffers
GetSystemInfo
RaiseException
GetCurrentThread
SetFilePointer
InitializeCriticalSection
HeapReAlloc
GetVolumeInformationW
GetFinalPathNameByHandleW
CreateEventW
InitializeCriticalSectionAndSpinCount
LockFileEx
UnlockFileEx
LocalAlloc
GetModuleFileNameW
WideCharToMultiByte
OpenProcess
DuplicateHandle
GetPrivateProfileSectionW
WaitForMultipleObjects
ReleaseSemaphore
SetEvent
CreateSemaphoreW
CreateThread
GetVolumeInformationByHandleW
GlobalMemoryStatusEx
WaitForMultipleObjectsEx
ResetEvent
CreateSemaphoreExW
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
LoadLibraryW
CreateProcessW
GetExitCodeProcess
SetVolumeMountPointW
LoadLibraryExA
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
Sleep
TlsFree
DeleteCriticalSection
TlsSetValue
TlsAlloc
ReleaseSRWLockExclusive
LocalFree
AcquireSRWLockExclusive
VirtualFree
VirtualAlloc
VirtualQuery
SetThreadIdealProcessor
WakeAllConditionVariable
LeaveCriticalSection
WriteFile
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptGetProperty
BCryptCreateHash
BCryptHashData
BCryptFinishHash
BCryptDestroyHash
ord20
ord22
ord23
GetSecurityDescriptorSacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
RegEnumValueW
EventWriteTransfer
EventUnregister
EventRegister
ConvertStringSecurityDescriptorToSecurityDescriptorW
FreeSid
SetNamedSecurityInfoW
AddAccessAllowedAceEx
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteKeyW
RegCreateKeyExW
InitiateSystemShutdownExW
RegUnLoadKeyW
RegLoadKeyW
RegSetValueExW
RegDeleteValueW
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
RegGetValueW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
GetSecurityDescriptorDacl
DuplicateTokenEx
RegDeleteTreeW
TraceMessage
RevertToSelf
CloseEncryptedFileRaw
WriteEncryptedFileRaw
OpenEncryptedFileRawW
SetThreadToken
EventWrite
RegDeleteKeyExW
OpenThreadToken
GetAclInformation
GetSecurityDescriptorLength
GetSecurityDescriptorControl
CharUpperW
LoadStringW
ImageNtHeader
CoInitializeEx
CoCreateInstance
CoUninitialize
CoCreateGuid
CoInitialize
CoTaskMemFree
VariantClear
SysAllocString
SysFreeString
VariantInit
UuidCreate
UuidToStringW
RpcStringFreeW
UuidCompare
WinRECheckGuid
WinREUseNewPBRImage
WinRE_Generalize
WinRE_Specialize
WinRE_Specialize_Offline
WinReAddTrustedBootApp
WinReClearBootApp
WinReClearError
WinReClearOemImagePath
WinReConfigureTask
WinReCopyDiagnosticFiles
WinReCopyLogFilesToRamdisk
WinReCreateLogInstance
WinReCreateLogInstanceEx
WinReDeleteLogFiles
WinReGetConfig
WinReGetCustomization
WinReGetError
WinReGetLogDirPath
WinReGetTrustedBootApps
WinReGetWIMInfo
WinReHashBootApp
WinReHashWimFile
WinReInitiateOfflineScanning
WinReInstall
WinReInstallOnTargetOS
WinReIsInstalledOnSystemPartition
WinReIsWimBootEnabled
WinReIsWinPE
WinReOobeInstall
WinReOpenLogInstance
WinRePostBCDRepair
WinReQueueRecoveryBoot
WinReReinstall
WinReRemoveTrustedBootApp
WinReRepair
WinReRestoreConfigAfterPBR
WinReRestoreLogFiles
WinReSetBootApp
WinReSetConfig
WinReSetCustomization
WinReSetError
WinReSetNarratorScheduled
WinReSetRecoveryAction
WinReSetTriggerFile
WinReSetupBackupWinRE
WinReSetupCheckWinRE
WinReSetupInstall
WinReSetupMigrateData
WinReSetupRestoreWinREEx
WinReSetupSetImage
WinReUnInstall
WinReUpdateLogInstance
WinReValidateRecoveryWim
WinReValidateWimFile
winreFindInstallMedia
winreGetBinaryArch
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ