Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
BrLauncher.exe
Resource
win10v2004-20240802-en
Target
BrLauncher.exe
Size
2.6MB
MD5
d5e2cc720c42614746cac2b73db09f19
SHA1
c3e9c8abf3834ae68c38e8d2bff3c08c27684336
SHA256
00f0cf41d0e6db9de1cf65faca3c0e54cbe043104cb63caa3f509c869cd62bb5
SHA512
f80f1bcf9552325cd74b8981213c691a79de18f594704fccbe417f7083f64de76903e7331ee9c727811c5b3d1e77926cf65a327200df05d07da46ce6e65b88f1
SSDEEP
24576:D6Z09h4woU5twtwN7PpknHh2/27jIZGR6qdst87SCctS+Y518wO9xCKiwWZgkY8:DRDoUHwyicEIYQqdst6/8wO9xC0IgkV
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\dev\out\win7-64bit\servers\BrLauncher.pdb
CoTaskMemFree
CoUninitialize
CoInitializeEx
MsgWaitForMultipleObjects
PeekMessageW
DispatchMessageW
TranslateMessage
GetUserObjectInformationA
GetThreadDesktop
OpenInputDesktop
CharUpperW
MessageBoxW
CloseDesktop
GetCurrentUserService
GetSystemDirectoryW
GetWindowsDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindNextFileW
GetFileAttributesW
GetFileSize
ReadFile
GetTempPathW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
ExpandEnvironmentStringsW
CreateEventW
GetSystemTimeAsFileTime
FlushFileBuffers
GetFileInformationByHandle
SetFilePointerEx
FindFirstFileExW
MultiByteToWideChar
WideCharToMultiByte
GetTickCount64
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
ReleaseMutex
CreateMutexW
WaitForMultipleObjects
TerminateThread
GetFileSizeEx
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
GetFinalPathNameByHandleW
TryAcquireSRWLockExclusive
TryAcquireSRWLockShared
SetErrorMode
OpenProcess
FreeLibrary
LoadLibraryW
WerRegisterRuntimeExceptionModule
SetDllDirectoryW
DuplicateHandle
InitializeCriticalSection
CreateRemoteThread
GetExitCodeThread
ResumeThread
GetThreadContext
SetThreadContext
GetVersion
VirtualProtect
VirtualQuery
VirtualAllocEx
VirtualProtectEx
VirtualQueryEx
ReadProcessMemory
WriteProcessMemory
VirtualFreeEx
LocalAlloc
ExitThread
FlushInstructionCache
VirtualAlloc
Sleep
CreateFileMappingA
CreateFileA
ExitProcess
TerminateProcess
CreateProcessA
lstrcpyW
GetModuleFileNameA
lstrcatA
OpenMutexW
OpenEventW
OpenFileMappingW
lstrcpyA
lstrlenA
DeviceIoControl
GetOverlappedResult
CancelIo
SetEvent
ResetEvent
CreatePipe
ReleaseSemaphore
CreateSemaphoreW
SetThreadPriority
LoadLibraryA
IsBadReadPtr
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetDriveTypeW
ReadConsoleW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
WaitForSingleObject
RaiseException
GetProcAddress
GetLocaleInfoW
CompareStringW
FlsFree
FlsSetValue
LCMapStringW
GetFullPathNameW
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
GetTimeZoneInformation
FormatMessageA
GetModuleHandleExW
GetModuleHandleA
GetModuleFileNameW
GetTickCount
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceFrequency
QueryPerformanceCounter
SetLastError
CloseHandle
OutputDebugStringA
WriteFile
SetFilePointer
DeleteFileW
CreateFileW
LocalFree
GetCommandLineW
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
DecodePointer
FlsGetValue
FlsAlloc
GetFileType
GetStdHandle
SetConsoleCtrlHandler
CreateThread
GetModuleHandleW
GetNativeSystemInfo
GetVersionExW
GetCurrentThread
GetCurrentProcess
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
lstrlenW
CreateProcessW
VirtualFree
IsDebuggerPresent
GetDynamicTimeZoneInformation
GetConsoleMode
GetConsoleOutputCP
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetThreadLocale
WriteConsoleW
SetEnvironmentVariableW
OutputDebugStringW
GetStringTypeW
EncodePointer
LCMapStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
IsProcessorFeaturePresent
WakeAllConditionVariable
SleepConditionVariableSRW
InitializeSListHead
GetStartupInfoW
RtlPcToFileHeader
RtlUnwindEx
FreeEnvironmentStringsW
htons
sendto
socket
WSAStartup
htonl
timeGetTime
GetUserProfileDirectoryW
GetAllUsersProfileDirectoryW
OpenProcessToken
StartServiceW
QueryServiceStatus
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfigW
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyW
RegDeleteValueA
RegDeleteKeyW
GetKernelObjectSecurity
LookupPrivilegeValueW
FreeSid
AllocateAndInitializeSid
AdjustTokenPrivileges
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
OpenThreadToken
ConvertSidToStringSidW
GetTokenInformation
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SymSetOptions
SymGetLineFromAddr64
SymInitialize
SymGetSearchPathW
SymSetSearchPathW
SymFromAddr
SHGetKnownFolderPath
SHGetFolderPathW
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ