Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
VSLauncher_[0MB]_[1].exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VSLauncher_[0MB]_[1].exe
Resource
win10v2004-20240508-en
Target
VSLauncher_[0MB]_[1].exe
Size
281KB
MD5
7a7bb3b0e57e4fb32c57b74e78e657ad
SHA1
f1dee943b1b6238b1466d83325c4099d189cd4b5
SHA256
87048cff2227d2901314760618d23917cfbc5cc15fc22dc355e803c5ee5fb211
SHA512
ef0c9985b640189ed9991b301cfbf9771df961e1bf67bf68c5833667db53977c9745bcfb42e059d8bb5bcd7a88253a715d86f65612dccc33514ccda3baaf24c2
SSDEEP
3072:Dawahjy56hh65Ndqp9ikqtPLy0gJmU/3j41IGvQC2mCILuCW+VoNDRUiuDhJoueT:dLlavj41nDlDOO9uunwiLWyIE2n
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
D:\dbs\el\ddvsm\out\binaries\x86ret\bin\i386\VSLauncher.pdb
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
EventRegister
EventWrite
EventProviderEnabled
EventUnregister
HeapFree
HeapAlloc
RaiseException
HeapDestroy
HeapSize
WideCharToMultiByte
GetEnvironmentVariableW
FreeLibrary
GetProcAddress
GetModuleHandleA
lstrcmpiA
IsDBCSLeadByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionEx
GetCommandLineW
DecodePointer
FindFirstFileW
FindNextFileW
FindClose
ExpandEnvironmentStringsW
GetFullPathNameW
GetLongPathNameW
GetStartupInfoW
GetStdHandle
SetEnvironmentVariableW
CreateProcessW
WaitForSingleObject
CompareFileTime
LockResource
FindResourceExW
FindResourceW
CloseHandle
GetUserDefaultUILanguage
GetFileAttributesW
lstrlenA
WriteConsoleW
ReadFile
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
FindNextFileA
FindFirstFileExA
OutputDebugStringW
LCMapStringW
UnmapViewOfFile
GetLastError
MultiByteToWideChar
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileW
SetErrorMode
IsValidCodePage
GetProcessHeap
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetACP
GetStringTypeW
GetFileType
LoadStringW
CharPrevW
GetWindowRect
SystemParametersInfoA
SetWindowPos
MessageBoxW
CharNextA
DialogBoxParamW
GetDlgItem
SetDlgItemTextW
SendDlgItemMessageW
SendMessageA
EndDialog
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoInitialize
CoUninitialize
SysAllocStringLen
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SysFreeString
VarUI4FromStr
ShellExecuteExW
CommandLineToArgvW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
IsAssertEtwEnabled
SetOnAssertCallback
WriteAssertEtwEventA
WriteAssertEtwEventW
_GetCallstack@20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ