Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
af1aafa1624850bb1ac9be76338056e504aff9c24a0b392aa9f6161cd5c2f235.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
af1aafa1624850bb1ac9be76338056e504aff9c24a0b392aa9f6161cd5c2f235.dll
Resource
win10v2004-20220812-en
Target
af1aafa1624850bb1ac9be76338056e504aff9c24a0b392aa9f6161cd5c2f235
Size
221KB
MD5
f81e02884489cede42a896f29f959080
SHA1
0b754844a21782a828b7291dcdadc0928a17f54a
SHA256
af1aafa1624850bb1ac9be76338056e504aff9c24a0b392aa9f6161cd5c2f235
SHA512
b4e24c138a3dd3bb8228f138f062c05b2aa8baa64d6fea61785c92677bad9442f441d3cdf04779b686db1b5ac0df776c598f394018406e0416e216509a6624c8
SSDEEP
6144:Y2XpEJsue2dD+bo+6NVrctkBWZTiixokxbk1:b+JsuzeotNytkBWZTikxbk1
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SizeofResource
LockResource
LoadResource
FindResourceExW
LoadLibraryW
GetProcAddress
DeleteCriticalSection
RaiseException
MultiByteToWideChar
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
FreeLibrary
lstrcmpiW
LoadLibraryExW
GetModuleHandleW
CreateFileW
DeleteFileA
FlushFileBuffers
GetCurrentProcessId
GetFileAttributesW
GetLastError
VirtualQuery
lstrlenA
lstrcpyA
CloseHandle
GetTempPathA
GetTempFileNameW
WideCharToMultiByte
CreateMutexW
GetCurrentProcess
GetModuleFileNameW
OpenProcess
Sleep
lstrcmpW
GlobalUnlock
OpenMutexW
InterlockedExchangeAdd
DuplicateHandle
ReadFile
SetFilePointer
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetTimeZoneInformation
GetDateFormatA
GetTimeFormatA
WriteConsoleW
WriteFile
CreateFileA
lstrcatA
lstrcpynA
GetModuleHandleA
GetModuleFileNameA
FindResourceW
lstrlenW
GlobalLock
GetVersionExW
GetConsoleOutputCP
WriteConsoleA
SetEnvironmentVariableA
CompareStringW
SetStdHandle
CompareStringA
GetStartupInfoA
SetHandleCount
GetFileType
LCMapStringW
LCMapStringA
GetOEMCP
GetCPInfo
GetStdHandle
HeapCreate
VirtualAlloc
VirtualFree
ExitProcess
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
RtlUnwind
GetCommandLineA
GetCurrentThreadId
GetSystemTimeAsFileTime
GetConsoleMode
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetConsoleCP
RegisterWindowMessageW
GetTopWindow
GetKeyboardLayout
GetWindowLongW
FindWindowExW
UnhookWindowsHookEx
SendMessageW
CallWindowProcW
GetWindow
KillTimer
SetTimer
SetWindowLongW
GetParent
GetClassNameW
CharNextW
UnregisterClassA
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
SHGetSpecialFolderPathW
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
SysAllocString
VariantChangeType
SysReAllocStringLen
SafeArrayUnlock
SafeArrayLock
SafeArrayDestroy
DispCallFunc
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetVartype
LoadTypeLi
LoadRegTypeLi
SysStringLen
VarBstrCat
VarBstrCmp
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
VariantCopy
VariantClear
VariantInit
SysFreeString
VarUI4FromStr
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ