Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
22419051d2111ca4f9bcca5e78f9da61b0480d0cf497bf48ea89503e99aae914.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
22419051d2111ca4f9bcca5e78f9da61b0480d0cf497bf48ea89503e99aae914.dll
Resource
win10v2004-20220812-en
Target
22419051d2111ca4f9bcca5e78f9da61b0480d0cf497bf48ea89503e99aae914
Size
89KB
MD5
96face034970377b69b3d063acab2ad0
SHA1
9712ccbc25b3616d78459c6560c3cbb5e1bdba8e
SHA256
22419051d2111ca4f9bcca5e78f9da61b0480d0cf497bf48ea89503e99aae914
SHA512
44f33a4fe17b8046db05cfba2bac631c2337b60fa14c114efe8aa637058838520d7e0d804d862de10adfa3a18eff54bcdd7172ee3e94a2f99678848d27c88e87
SSDEEP
1536:e3vD2Cmcvp8KhWwqi/q3Vls1ikoV47gwUJPuHvkraaCh:qHOyWpi/AVOBgwUJPuHcOL
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenProcess
lstrlenA
GetExitCodeThread
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
SetErrorMode
CreateThread
GetCommandLineA
GetLocaleInfoA
UnmapViewOfFile
VirtualAlloc
MapViewOfFile
CreateFileMappingA
ReadFile
SetFilePointer
GetFileSize
CreateFileA
GetPrivateProfileStringA
GetLastError
GetLocalTime
VirtualFree
lstrcmpA
lstrcpynA
GetCurrentThread
WriteFile
GetCurrentProcess
TerminateProcess
CreateMutexA
GetTickCount
GetVersionExA
CompareStringW
FlushFileBuffers
CreateFileW
lstrlenW
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
GetProcAddress
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
Sleep
GetModuleFileNameA
OpenMutexA
lstrcpyA
CloseHandle
GetStringTypeW
LCMapStringW
MultiByteToWideChar
WriteConsoleW
SetStdHandle
HeapReAlloc
HeapSize
LoadLibraryW
SetEnvironmentVariableA
IsValidCodePage
GetOEMCP
GetACP
VirtualQuery
SetLastError
VirtualProtect
InterlockedCompareExchange
GetCurrentThreadId
ResumeThread
FlushInstructionCache
GetThreadContext
SetThreadContext
SuspendThread
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
DecodePointer
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
IsProcessorFeaturePresent
WideCharToMultiByte
GetTimeZoneInformation
HeapCreate
HeapDestroy
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
CharLowerA
wsprintfW
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
htons
recv
closesocket
WSAStartup
ntohs
send
connect
socket
StrStrIA
PathRemoveFileSpecA
?Detoured@@YGPAUHINSTANCE__@@XZ
start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ