Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
654057b41209eb056f7a219e0d39a26ff455c22a57d86036a4153b3905089170.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
654057b41209eb056f7a219e0d39a26ff455c22a57d86036a4153b3905089170.dll
Resource
win10v2004-20221111-en
Target
654057b41209eb056f7a219e0d39a26ff455c22a57d86036a4153b3905089170
Size
53KB
MD5
9100c3433445464faa6ee914964eb010
SHA1
31fa48b04fa99494d9812357a9ac8e737a5896e0
SHA256
654057b41209eb056f7a219e0d39a26ff455c22a57d86036a4153b3905089170
SHA512
20871edfda790fedf49a43cb95e1651e5dcd311745472cb2d5afa1cd31ac7fec8dfa6a2040eae03f0ed8a9e522ab4d656dbf2e02beea7c8fae7cfec63f3928a2
SSDEEP
768:+8MGge5M45ze/qB46qsm6mG4gpN6EAA3v45xWbMtQMMWAOT+xrcpKAjHslK1ycDk:DDge5h5zepum6jt2v5xXQMMGT4rcQLdL
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrcatA
GetProcAddress
LoadLibraryA
GetWindowsDirectoryA
Beep
BindIoCompletionCallback
ClearCommBreak
CreateEventA
CreateJobObjectA
DefineDosDeviceW
DeleteTimerQueueEx
DeleteTimerQueueTimer
DeleteVolumeMountPointW
DnsHostnameToComputerNameW
EndUpdateResourceW
EnumResourceTypesW
EnumSystemCodePagesW
EnumSystemLocalesW
FindFirstChangeNotificationA
FindFirstChangeNotificationW
FindFirstVolumeMountPointW
FindNextFileA
FindNextVolumeMountPointA
FindVolumeMountPointClose
GetAtomNameA
GetCPInfo
GetCPInfoExA
GetCommandLineW
GetConsoleAliasA
GetCurrentProcess
GetCurrentThread
GetDiskFreeSpaceA
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileAttributesW
GetModuleHandleW
GetProcessShutdownParameters
GetShortPathNameW
GetStringTypeW
GetSystemDefaultLCID
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetThreadLocale
GetUserDefaultLangID
GetVolumeInformationA
GlobalDeleteAtom
GlobalFix
CreateFileA
GlobalMemoryStatus
GlobalSize
GlobalUnWire
HeapCreate
HeapLock
HeapReAlloc
HeapWalk
InitAtomTable
IsBadHugeReadPtr
LocalFileTimeToFileTime
LocalReAlloc
Module32First
Module32NextW
MoveFileExW
OpenJobObjectA
OpenJobObjectW
OutputDebugStringW
PeekConsoleInputA
Process32Next
ReadConsoleInputA
ReadConsoleOutputA
ReadFileScatter
RemoveDirectoryW
ReplaceFileW
SetComputerNameExW
SetConsoleScreenBufferSize
SetCurrentDirectoryW
SetFilePointerEx
SetHandleCount
SetLastError
SetLocaleInfoA
SetTapeParameters
SetThreadAffinityMask
SetVolumeMountPointW
TlsGetValue
UnlockFileEx
VirtualUnlock
WaitForMultipleObjects
WaitForSingleObject
WaitNamedPipeW
WriteConsoleW
WriteFileEx
_lwrite
lstrcpyn
lstrcpynA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
GlobalGetAtomNameW
VirtualAlloc
IsDebuggerPresent
CreateCursor
CreateDesktopA
DdeClientTransaction
DdeEnableCallback
DdeGetData
DdeUninitialize
DestroyMenu
DialogBoxIndirectParamA
DialogBoxIndirectParamW
DialogBoxParamW
DlgDirSelectExW
EnumClipboardFormats
EnumDisplayDevicesA
EnumDisplaySettingsW
EnumPropsA
EnumPropsExA
GetActiveWindow
GetClipboardFormatNameA
GetClipboardFormatNameW
GetClipboardViewer
GetDlgItemInt
GetDlgItemTextA
GetGuiResources
GetKeyNameTextW
GetMessageA
GetNextDlgTabItem
GetParent
GetWindowContextHelpId
GetWindowModuleFileNameA
GetWindowTextA
GetWindowThreadProcessId
IMPGetIMEW
IMPSetIMEA
InvertRect
IsClipboardFormatAvailable
IsDlgButtonChecked
IsIconic
IsRectEmpty
CopyAcceleratorTableW
IsZoomed
LoadMenuIndirectW
LoadMenuW
LockSetForegroundWindow
LookupIconIdFromDirectory
MapVirtualKeyExA
MessageBeep
ModifyMenuW
MonitorFromPoint
NotifyWinEvent
PtInRect
RealGetWindowClassW
RedrawWindow
RegisterClassExW
RegisterClipboardFormatA
RegisterClipboardFormatW
ReleaseDC
SendIMEMessageExA
SetClassLongW
SetClipboardData
SetClipboardViewer
SetMenuItemBitmaps
SetMenuItemInfoA
SetMenuItemInfoW
SetPropA
SetRectEmpty
SetSysColors
SetWinEventHook
SetWindowLongW
SetWindowPlacement
SetWindowTextW
SetWindowsHookExA
SetWindowsHookExW
SystemParametersInfoW
TileChildWindows
ToAscii
TrackPopupMenu
UnhookWindowsHook
UnionRect
UpdateLayeredWindow
VkKeyScanExA
VkKeyScanW
WaitForInputIdle
WinHelpA
CloseWindow
CheckDlgButton
AllowSetForegroundWindow
AppendMenuW
BeginDeferWindowPos
CharUpperBuffA
IsWindow
RegOpenKeyExA
CoBuildVersion
CoCreateGuid
CoCreateInstanceEx
CoDisconnectObject
CoGetApartmentID
CoGetCallContext
CoGetCancelObject
CoGetInstanceFromFile
CoGetInstanceFromIStorage
CoGetMarshalSizeMax
CoGetTreatAsClass
CoImpersonateClient
CoInitializeSecurity
CoInitializeWOW
CoLockObjectExternal
CoQueryAuthenticationServices
CoQueryClientBlanket
CoQueryReleaseObject
CoRegisterMessageFilter
CoRegisterSurrogateEx
CoReleaseServerProcess
CoResumeClassObjects
CoTaskMemFree
CreateFileMoniker
CreateGenericComposite
CreateObjrefMoniker
DcomChannelSetHResult
FmtIdToPropStgName
GetDocumentBitStg
GetHGlobalFromStream
HACCEL_UserMarshal
HACCEL_UserUnmarshal
HBITMAP_UserFree
HBITMAP_UserSize
HBRUSH_UserMarshal
HBRUSH_UserUnmarshal
HDC_UserSize
HENHMETAFILE_UserFree
HENHMETAFILE_UserUnmarshal
HMENU_UserFree
HMENU_UserUnmarshal
HMETAFILEPICT_UserMarshal
HMETAFILEPICT_UserUnmarshal
HMETAFILE_UserUnmarshal
HkOleRegisterObject
MonikerCommonPrefixWith
MonikerRelativePathTo
OleConvertOLESTREAMToIStorage
OleCreate
OleCreateEmbeddingHelper
OleCreateFromData
OleCreateFromDataEx
OleCreateFromFileEx
OleCreateLinkEx
OleCreateLinkToFileEx
OleGetAutoConvert
OleInitializeWOW
OleLockRunning
OleMetafilePictFromIconAndLabel
OleQueryCreateFromData
OleRegEnumVerbs
OleRegGetMiscStatus
OleRegGetUserType
OleSetContainedObject
OleSetMenuDescriptor
PropStgNameToFmtId
ReadClassStg
ReadClassStm
STGMEDIUM_UserFree
STGMEDIUM_UserMarshal
StgConvertPropertyToVariant
StgCreatePropSetStg
StgCreatePropStg
StgGetIFillLockBytesOnILockBytes
StgIsStorageILockBytes
StgOpenAsyncDocfileOnIFillLockBytes
StgOpenPropStg
StgOpenStorageEx
UpdateDCOMSettings
UtConvertDvtd32toDvtd16
WdtpInterfacePointer_UserSize
WdtpInterfacePointer_UserUnmarshal
WriteFmtUserTypeStg
WriteOleStg
WriteStringStream
CoAllowSetForegroundWindow
CoAddRefServerProcess
CLSIDFromProgIDEx
CLSIDFromProgID
CoCopyProxy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ