Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
0c302021a8605393d37dd2d42da48cac85bd12a1cfb96f805a83127fc177cb6a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0c302021a8605393d37dd2d42da48cac85bd12a1cfb96f805a83127fc177cb6a.dll
Resource
win10v2004-20220812-en
Target
0c302021a8605393d37dd2d42da48cac85bd12a1cfb96f805a83127fc177cb6a
Size
70KB
MD5
c8ce712841d4c8b189c7ca843544fc72
SHA1
21417be195415a454bb74309486fdde72d05eeba
SHA256
0c302021a8605393d37dd2d42da48cac85bd12a1cfb96f805a83127fc177cb6a
SHA512
108739f64c8daf3eca43e9fdcacbd1c07ab8a61622f7384fb353e2389929c936078c8165141f7a3ad6b9670fb9ac45bb6426c8eeffac56dd481677ec57c21b77
SSDEEP
1536:IJXNB3m3scbpR9qMVjL+GYdFGm1US9XDHfOv/u:iUbT/L+GzTSJDHJ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetDriveTypeA
GetEnvironmentVariableA
GetFileSize
GetLastError
GetLocaleInfoA
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetOverlappedResult
GetPrivateProfileStringA
GetProcAddress
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalReAlloc
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
LockFileEx
MapViewOfFile
GetCurrentProcessId
OpenMutexA
OpenProcess
PeekNamedPipe
Process32First
Process32Next
ReadFile
ReadFileEx
ReleaseMutex
ResetEvent
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
SetNamedPipeHandleState
Sleep
TerminateProcess
TryEnterCriticalSection
UnlockFileEx
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
WaitForSingleObjectEx
WaitNamedPipeA
WideCharToMultiByte
WriteFile
WriteFileEx
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpyW
lstrcpynA
lstrlenA
lstrlenW
GetCurrentProcess
GetComputerNameA
FindNextFileA
FindFirstFileA
FindClose
ExpandEnvironmentStringsA
ExitProcess
EnterCriticalSection
DisconnectNamedPipe
DeleteFileA
DeviceIoControl
DeleteCriticalSection
CreateToolhelp32Snapshot
CreateThread
CreateProcessA
CreateNamedPipeA
CreateMutexA
CreateFileW
CreateFileMappingA
CreateFileA
CreateEventA
CreateDirectoryA
CopyFileA
ConnectNamedPipe
MultiByteToWideChar
CloseHandle
recv
listen
select
inet_addr
htons
send
socket
getsockname
getpeername
gethostbyname
connect
closesocket
bind
accept
__WSAFDIsSet
WSAStartup
WSAGetLastError
WSACleanup
ioctlsocket
ReleaseDC
GetDesktopWindow
LoadCursorA
DrawTextA
DrawIcon
CharUpperBuffW
wsprintfA
GetWindowRect
GetWindowDC
ExitWindowsEx
GetIconInfo
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
GetUserNameA
ShellExecuteA
CreateCompatibleDC
DeleteDC
DeleteObject
GdiFlush
SelectObject
SetBkColor
SetStretchBltMode
SetTextColor
StretchBlt
CreateDIBSection
CreateStreamOnHGlobal
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ