Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
sdelete64.1.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
sdelete64.1.exe
Resource
win10v2004-20240802-en
Target
sdelete64.1.exe
Size
218KB
MD5
6a4e049d8c497d350a7bd54dfff99808
SHA1
7f1d32424c961542ae172c5b8c1611291c30fc4f
SHA256
59e5ae1e99c6a4ccc01e8abdc2534210ec5faa945754a89524b06381da8c20a1
SHA512
41169089fa67e1a0ff1360dc5428b89dcee0d642204ddb7dac80d6cf859caae3c2b14fa89ce72072fb780c0a93f53eb0ff9414a8e88b1d783bfa75c9c4ea353d
SSDEEP
3072:JnGeRz3KFFfQku+5pSlQ5VmFMPyW4UnLJm3XnVVMHxarvYY3Qih8KjzY:JGQOF1vf5pS8Vb6IJ6noeL3X8X
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\a\1\s\x64\Release\Sdelete64.pdb
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
ExpandEnvironmentStringsW
GetCurrentDirectoryW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetDiskFreeSpaceW
GetFileAttributesW
GetFullPathNameW
ReadFile
RemoveDirectoryW
SetFileAttributesW
SetFilePointer
WriteFile
CloseHandle
GetLastError
VerSetConditionMask
WaitForSingleObject
GetTickCount
VirtualAlloc
VirtualFree
FormatMessageW
MoveFileW
VerifyVersionInfoW
GetFileSizeEx
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
LocalFree
LocalAlloc
GetProcAddress
GetModuleHandleW
GetCommandLineW
LoadLibraryExW
GetStdHandle
SetLastError
GetVersionExW
GetModuleFileNameW
GetFileType
SetFilePointerEx
HeapSize
HeapReAlloc
DeviceIoControl
SetUnhandledExceptionFilter
FindFirstFileExW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
WriteConsoleW
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
EncodePointer
RaiseException
RtlPcToFileHeader
SetStdHandle
ExitProcess
GetModuleHandleExW
GetConsoleCP
GetCommandLineA
HeapAlloc
HeapFree
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
WideCharToMultiByte
SetConsoleMode
ReadConsoleInputW
GetStringTypeW
SendMessageW
DialogBoxIndirectParamW
LoadCursorW
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextW
EndDialog
GetDlgItem
StartPage
EndDoc
StartDocW
SetMapMode
GetDeviceCaps
EndPage
PrintDlgW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegCreateKeyW
RegCloseKey
RegSetValueExW
BCryptGenRandom
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ