Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
_4bitmapibroker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
_4bitmapibroker.exe
Resource
win10v2004-20241007-en
Target
_4bitmapibroker.exe
Size
253KB
MD5
4270986209ceb3e7b31b65e65d96626b
SHA1
f3f1bb1a04143a060ce88fb7e8b2689497534a1d
SHA256
cac624724a2b9d7232622db8da48b08312175059f01e052cd894eeb74a81ba18
SHA512
1c09863c3360bb330eb503a24949a05b665d27a885ab53fadcbe77b3ba66e6a895607df82a32b545fbe04043a4b09c5d46970ce29ccb05303bed89a3641694d8
SSDEEP
3072:/3jpdeVK0plvAN+2n9fqX8o8MnOYUlls8AXx32ODbnxi2N7IJZMxveESpvOyUQqJ:/38lYN+wqXdnOtv0B2ODViKeZGN8g
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
64BitMAPIBroker.pdb
CreateEventW
GetLastError
SetEvent
CloseHandle
CreateThread
ResetEvent
GetProcAddress
LocalFree
DeleteCriticalSection
GetCurrentProcessId
GetModuleHandleW
TransactNamedPipe
GetFileType
CreateEventA
WaitNamedPipeW
ConnectNamedPipe
LocalAlloc
GetCurrentThreadId
VerSetConditionMask
VerifyVersionInfoW
SleepConditionVariableCS
InitializeCriticalSectionEx
RaiseException
CreateNamedPipeA
WaitForMultipleObjects
DisconnectNamedPipe
OpenProcess
GetOverlappedResult
FlushFileBuffers
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
LoadLibraryA
FreeLibrary
WideCharToMultiByte
GetCommandLineA
Sleep
CreateFileW
WaitForSingleObject
CreateMutexW
WriteConsoleW
GetConsoleMode
GetConsoleCP
SetFilePointerEx
HeapReAlloc
HeapSize
GetStringTypeW
SetStdHandle
GetProcessHeap
InitializeCriticalSection
LeaveCriticalSection
CreateNamedPipeW
WriteFile
GetCurrentProcess
EnterCriticalSection
ReadFile
SetLastError
SetNamedPipeHandleState
PeekNamedPipe
LCMapStringW
MultiByteToWideChar
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreA
GetCurrentThread
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
RtlUnwindEx
RtlPcToFileHeader
EncodePointer
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
HeapFree
HeapAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
DispatchMessageA
TranslateMessage
GetMessageA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
OpenProcessToken
GetTokenInformation
OpenThreadToken
ConvertSidToStringSidA
ConvertStringSecurityDescriptorToSecurityDescriptorA
SHGetFileInfoW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ