Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
6c54468388d4198bfb5151370e33f30b4ea9dac2580b9a9837070619a6756712.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6c54468388d4198bfb5151370e33f30b4ea9dac2580b9a9837070619a6756712.dll
Resource
win10v2004-20220812-en
Target
6c54468388d4198bfb5151370e33f30b4ea9dac2580b9a9837070619a6756712
Size
109KB
MD5
62d6242c7db6c7d0970a68bee3d55a72
SHA1
3a8ae92ea2a9399510395431d93db0c636ca3f9b
SHA256
6c54468388d4198bfb5151370e33f30b4ea9dac2580b9a9837070619a6756712
SHA512
04daa131616c221dbc91d7725240418c43aebdbd18c84a54f7664778afc1c86075b01ac86596b1299ee7a958174a11b41f3650cd4b8f92380a5caac1d2a2331a
SSDEEP
1536:cmfbFBKxnBbnErvv8hRfxNZVsreWdCMALOtw4ly/9FTgo9uxAc7sDh4+WMaiCq:jZQxnEgNZSmMAnRNuxfsDh4+s0
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetupDiGetDeviceInterfaceDetailW
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
GetCurrentProcessId
GetSystemInfo
VirtualProtect
SetStdHandle
SetLastError
DeviceIoControl
GetLastError
CloseHandle
CreateFileW
WideCharToMultiByte
Sleep
GetOverlappedResult
WriteFile
ReadFile
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
RaiseException
InterlockedExchange
GetACP
GetLocaleInfoA
LCMapStringW
GetVersionExA
RtlUnwind
ExitProcess
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
HeapReAlloc
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
LCMapStringA
GetSystemTimeAsFileTime
GetModuleFileNameA
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
HeapSize
VirtualQuery
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetOEMCP
GetCPInfo
SetFilePointer
MultiByteToWideChar
LoadLibraryA
GetStringTypeA
GetStringTypeW
FlushFileBuffers
CoCreateInstance
AdbCloseHandle
AdbCreateInterface
AdbCreateInterfaceByName
AdbEnumInterfaces
AdbGetDefaultBulkReadEndpointInformation
AdbGetDefaultBulkWriteEndpointInformation
AdbGetEndpointInformation
AdbGetEndpointInterface
AdbGetInterfaceName
AdbGetOvelappedIoResult
AdbGetSerialNumber
AdbGetUsbConfigurationDescriptor
AdbGetUsbDeviceDescriptor
AdbGetUsbInterfaceDescriptor
AdbHasOvelappedIoComplated
AdbNextInterface
AdbOpenDefaultBulkReadEndpoint
AdbOpenDefaultBulkWriteEndpoint
AdbOpenEndpoint
AdbQueryInformationEndpoint
AdbReadEndpointAsync
AdbReadEndpointSync
AdbResetInterfaceEnum
AdbWriteEndpointAsync
AdbWriteEndpointSync
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ