Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
a85075a47f5e52c85fc1b87e307f35be02d1921156f4029b8710d6637bbc75f0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a85075a47f5e52c85fc1b87e307f35be02d1921156f4029b8710d6637bbc75f0.dll
Resource
win10v2004-20220812-en
Target
a85075a47f5e52c85fc1b87e307f35be02d1921156f4029b8710d6637bbc75f0
Size
69KB
MD5
61e9847b8c259ebce99d3247a9525ef2
SHA1
9f795b3255e84e63d2728286d2290c5d846901ef
SHA256
a85075a47f5e52c85fc1b87e307f35be02d1921156f4029b8710d6637bbc75f0
SHA512
7861a7be8f9f4f78e1b40d9e1f0a7bb454283d2fe41b9b204534120fee0dcb836897bab1e392d23c36cf1f082fdb2b1314e1c94df9083ba21b57e14883a4c24f
SSDEEP
1536:4+NqhCVSYPeLWHTVdghuGDu+r0q4nfDgJcu6IjUltsj:4+IhCLPJHT8Rf4nf6cu6IjU7sj
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Netbios
GetCurrentProcessId
lstrcpyA
DisableThreadLibraryCalls
GetModuleFileNameA
InterlockedIncrement
InterlockedDecrement
lstrcpynA
lstrcatA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
OutputDebugStringA
CreateFileA
GetProcAddress
LoadLibraryA
VirtualProtect
ResetEvent
WaitForSingleObject
ReadFile
GetSystemDirectoryA
WriteFile
SetFilePointer
GetCurrentProcess
DuplicateHandle
GetFileSize
lstrcmpiA
SetFileAttributesA
lstrcmpA
GetLocalTime
CreateEventA
SetEvent
CreateThread
OpenEventA
GetTempPathA
GetCommandLineW
FindClose
FindNextFileA
FindFirstFileA
CreateRemoteThread
Module32Next
Module32First
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
GetExitCodeProcess
Sleep
TerminateProcess
OpenProcess
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
lstrlenA
GetLastError
WideCharToMultiByte
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
DeleteFileA
EnumWindows
GetWindowThreadProcessId
EnumChildWindows
SetWindowLongA
SetForegroundWindow
GetClassNameA
CharNextA
FindWindowExA
wvsprintfA
SetWindowTextA
wsprintfA
CallWindowProcA
SendMessageA
FindWindowA
GetClientRect
GetWindowLongA
GetWindowTextA
RegCloseKey
InitializeSecurityDescriptor
InitializeAcl
LookupAccountNameA
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegOpenKeyA
RegSetKeySecurity
RegEnumValueA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
SHGetFolderPathA
CommandLineToArgvW
ShellExecuteA
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
CoInitialize
StringFromGUID2
CoTaskMemAlloc
SysStringLen
LoadRegTypeLi
VarUI4FromStr
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
PathFindExtensionA
wnsprintfA
SHDeleteKeyA
SHSetValueA
SHGetValueA
WSACleanup
gethostbyname
send
socket
htons
inet_addr
connect
closesocket
WSAStartup
??2@YAPAXI@Z
strchr
strlen
sprintf
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_initterm
_adjust_fdiv
__CppXcptFilter
__security_error_handler
_strlwr
_stricmp
??_U@YAPAXI@Z
realloc
wcsncpy
__CxxFrameHandler
strstr
strrchr
_purecall
??_V@YAXPAX@Z
??3@YAXPAX@Z
memset
_CxxThrowException
memcpy
_except_handler3
_resetstkoflw
free
malloc
memcmp
AfxFindMemoryInSky
AfxReplaceText
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ