Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
aaa9769d0012061934ff03352f83994dded7f591be4f2c5264e80877cb5ed6d9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aaa9769d0012061934ff03352f83994dded7f591be4f2c5264e80877cb5ed6d9.dll
Resource
win10v2004-20220901-en
Target
aaa9769d0012061934ff03352f83994dded7f591be4f2c5264e80877cb5ed6d9
Size
199KB
MD5
75658f71b5a4165ed39c6a1d6cf86809
SHA1
6f1af30fde134675e4f76a623ccc2247d339ff6a
SHA256
aaa9769d0012061934ff03352f83994dded7f591be4f2c5264e80877cb5ed6d9
SHA512
0652be36e0f9649a2f02d08f1af1b425f13d398ec65e468de32db9ff76534e3995ee9937f991515bd364fb1a0e985e13810750b42bedac18ee895b7b80ffe859
SSDEEP
3072:6i5V+MPRR514iK8w/OI3HSUgFqnRKm+4RmQeFeVnoj3SZQwqjXZWX+BIbB0kO:6i5V+aRR5yiKhBK61+4RmNeZy4I00kO
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindResourceExW
WriteFile
lstrcatA
GetModuleFileNameA
GetVersionExA
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
CreateFileW
GetModuleHandleW
CloseHandle
MultiByteToWideChar
lstrcmpiW
VirtualQuery
FlushFileBuffers
GetModuleFileNameW
FreeLibrary
LoadLibraryExW
lstrcpyA
lstrlenA
GetFileAttributesW
GetCurrentProcessId
DeleteFileA
lstrcpynA
OpenMutexW
FindResourceW
GetCurrentProcess
lstrcmpW
GlobalLock
Sleep
SetFilePointer
GetLocalTime
ReadFile
SetStdHandle
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
LoadLibraryW
GetProcAddress
InterlockedExchangeAdd
lstrlenW
FreeEnvironmentStringsW
WriteConsoleW
GetStartupInfoW
GetFileType
SetHandleCount
GetStringTypeW
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapCreate
GetStdHandle
ExitProcess
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsProcessorFeaturePresent
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCommandLineA
GetCurrentThreadId
DecodePointer
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RtlUnwind
EncodePointer
GetWindow
SetWindowLongW
GetParent
GetClassNameW
SendMessageW
RegisterWindowMessageW
CallWindowProcW
GetTopWindow
CharNextW
FindWindowExW
GetWindowLongW
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
RegCloseKey
RegCreateKeyExA
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
SysAllocString
DispCallFunc
VariantChangeType
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SafeArrayDestroy
SysAllocStringLen
SysStringByteLen
SysAllocStringByteLen
SysReAllocStringLen
SafeArrayUnlock
SafeArrayLock
SafeArrayGetLBound
SafeArrayGetUBound
VariantCopy
VariantClear
VariantInit
VarBstrCmp
VarBstrCat
SysFreeString
SysStringLen
SafeArrayGetVartype
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.