Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
67843d1fff846e987a2514108699c53a93797d430d295da55200304f4e6e4ac1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67843d1fff846e987a2514108699c53a93797d430d295da55200304f4e6e4ac1.dll
Resource
win10v2004-20220812-en
Target
67843d1fff846e987a2514108699c53a93797d430d295da55200304f4e6e4ac1
Size
69KB
MD5
a27d60ad121a180c1cca93e77409caf3
SHA1
8b3e6af1b9b23676844fa5f21678decd4f1e1185
SHA256
67843d1fff846e987a2514108699c53a93797d430d295da55200304f4e6e4ac1
SHA512
ea7bf5b4c8f0910cb2c8c1db254ae67565e8883e29ae96d7536a133bd2406d031a442e5403e13fc75468a27c259e165a6953223046ce08718daf7577e6c3f8fb
SSDEEP
1536:4+NqhCVSYPeLWHTVdghuGDu+r0q4nfSgZcu6IjUltsj:4+IhCLPJHT8Rf4nfncu6IjU7sj
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Netbios
GetCurrentProcessId
lstrcpyA
DisableThreadLibraryCalls
GetModuleFileNameA
InterlockedIncrement
InterlockedDecrement
lstrcpynA
lstrcatA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
OutputDebugStringA
CreateFileA
GetProcAddress
LoadLibraryA
VirtualProtect
ResetEvent
WaitForSingleObject
ReadFile
GetSystemDirectoryA
WriteFile
SetFilePointer
GetCurrentProcess
DuplicateHandle
GetFileSize
lstrcmpiA
SetFileAttributesA
lstrcmpA
GetLocalTime
CreateEventA
SetEvent
CreateThread
OpenEventA
GetTempPathA
GetCommandLineW
FindClose
FindNextFileA
FindFirstFileA
CreateRemoteThread
Module32Next
Module32First
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
GetExitCodeProcess
Sleep
TerminateProcess
OpenProcess
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
lstrlenA
GetLastError
WideCharToMultiByte
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
DeleteFileA
EnumWindows
GetWindowThreadProcessId
EnumChildWindows
SetWindowLongA
SetForegroundWindow
GetClassNameA
CharNextA
FindWindowExA
wvsprintfA
SetWindowTextA
wsprintfA
CallWindowProcA
SendMessageA
FindWindowA
GetClientRect
GetWindowLongA
GetWindowTextA
RegCloseKey
InitializeSecurityDescriptor
InitializeAcl
LookupAccountNameA
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegOpenKeyA
RegSetKeySecurity
RegEnumValueA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
SHGetFolderPathA
CommandLineToArgvW
ShellExecuteA
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
CoInitialize
StringFromGUID2
CoTaskMemAlloc
SysStringLen
LoadRegTypeLi
VarUI4FromStr
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
PathFindExtensionA
wnsprintfA
SHDeleteKeyA
SHSetValueA
SHGetValueA
WSACleanup
gethostbyname
send
socket
htons
inet_addr
connect
closesocket
WSAStartup
??2@YAPAXI@Z
strchr
strlen
sprintf
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_initterm
_adjust_fdiv
__CppXcptFilter
__security_error_handler
_strlwr
_stricmp
??_U@YAPAXI@Z
realloc
wcsncpy
__CxxFrameHandler
strstr
strrchr
_purecall
??_V@YAXPAX@Z
??3@YAXPAX@Z
memset
_CxxThrowException
memcpy
_except_handler3
_resetstkoflw
free
malloc
memcmp
AfxFindMemoryInSky
AfxReplaceText
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ