Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b431b526d54b875830710056c41f651141709d4de6fef2634a15ccd785b43e96.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b431b526d54b875830710056c41f651141709d4de6fef2634a15ccd785b43e96.exe
Resource
win10v2004-20240704-en
Target
b431b526d54b875830710056c41f651141709d4de6fef2634a15ccd785b43e96
Size
7.4MB
MD5
16581e7a3a1404348f405f354c4a7ddf
SHA1
30a78e401af4800e77d1cb37a01ba73df10a88ca
SHA256
b431b526d54b875830710056c41f651141709d4de6fef2634a15ccd785b43e96
SHA512
5eb6e546dd04e42bf412735d9884df5ecf565fa91aa7246c80d35dce26191b4be405d7b49fb1b849645fb60a1ea498452c8e0911075a2ee0d32aba0a80e0fe96
SSDEEP
98304:WkOfXFkZa7mEh3liXUxV07VWhlRg3jAnC5Hc4UVG1:eXFkZaj3liXUxV07VWhlRIAC5HEY
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
/proc/self/cwd/blaze-out/win_x86-opt/bin/apps/drive/fs/distribution/win/installer/uninstall.pdb
AcquireSRWLockExclusive
AssignProcessToJobObject
CloseHandle
CompareStringW
CopyFileW
CreateDirectoryW
CreateEventW
CreateFileA
CreateFileMappingW
CreateFileW
CreateJobObjectW
CreateProcessW
CreateThread
CreateToolhelp32Snapshot
DecodePointer
DeleteCriticalSection
DeleteFileW
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
FileTimeToSystemTime
FindClose
FindFirstFileExW
FindFirstFileW
FindNextFileW
FindResourceW
FlushFileBuffers
FlushInstructionCache
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetDriveTypeW
GetEnvironmentStringsW
GetEnvironmentVariableA
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesW
GetFileInformationByHandle
GetFileSizeEx
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoEx
GetLocaleInfoW
GetLogicalProcessorInformation
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetNativeSystemInfo
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathW
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetUserPreferredUILanguages
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeConditionVariable
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeSListHead
InitializeSRWLock
InterlockedPopEntrySList
InterlockedPushEntrySList
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LoadResource
LocalFree
LockResource
MapViewOfFile
MoveFileExW
MulDiv
MultiByteToWideChar
OpenProcess
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
Process32FirstW
Process32NextW
QueryFullProcessImageNameW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadConsoleW
ReadFile
ReleaseSRWLockExclusive
RemoveDirectoryW
ResetEvent
RtlUnwind
SetEndOfFile
SetEnvironmentVariableW
SetEvent
SetFileAttributesW
SetFilePointerEx
SetInformationJobObject
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
Sleep
SleepConditionVariableSRW
SwitchToThread
SystemTimeToTzSpecificLocalTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
WaitForSingleObject
WaitForSingleObjectEx
WakeAllConditionVariable
WakeConditionVariable
WideCharToMultiByte
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
WriteConsoleW
WriteFile
lstrlenW
CallWindowProcW
DefWindowProcW
DialogBoxParamW
DispatchMessageA
DispatchMessageW
DrawTextW
EnableWindow
EndDialog
GetActiveWindow
GetClientRect
GetDC
GetDlgCtrlID
GetDlgItem
GetFocus
GetMessageA
GetMessageW
GetSysColor
GetSystemMetrics
GetWindowLongW
GetWindowRect
GetWindowTextW
IsDlgButtonChecked
IsWindow
IsWindowUnicode
LoadBitmapW
MapWindowPoints
MessageBoxW
MoveWindow
MsgWaitForMultipleObjectsEx
PeekMessageW
PostMessageW
ReleaseDC
SendMessageW
SetDlgItemTextW
SetFocus
SetRect
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
TranslateMessage
UnregisterClassW
CoCreateInstance
CoInitialize
CoTaskMemFree
CoUninitialize
AddFontMemResourceEx
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectW
DPtoLP
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectW
GetStockObject
GetTextMetricsW
RemoveFontMemResourceEx
SelectObject
SetBkMode
SetTextColor
StretchBlt
PathCombineW
PathFileExistsW
PathFindExtensionW
PathFindFileNameA
PathFindFileNameW
PathIsDirectoryW
PathRemoveExtensionW
PathRemoveFileSpecW
StrCmpIW
CloseServiceHandle
ControlService
ConvertSidToStringSidW
GetUserNameW
LookupAccountNameW
OpenSCManagerW
OpenServiceW
QueryServiceStatus
RegCloseKey
RegCreateKeyExW
RegDeleteKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegGetValueW
RegOpenKeyExA
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
CommandLineToArgvW
SHGetKnownFolderPath
InstallHinfSectionW
SetupCloseInfFile
SetupFindFirstLineW
SetupGetStringFieldW
SetupOpenInfFileW
SymFromAddr
uprv_getICUData_bcp47
uprv_getICUData_currmeta
uprv_getICUData_custom
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ