Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
94a6ba1213734cda866e39c6aad32d6950edd47158db65c85d47476fe654918b.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
94a6ba1213734cda866e39c6aad32d6950edd47158db65c85d47476fe654918b.dll
Resource
win10v2004-20230703-en
Target
94a6ba1213734cda866e39c6aad32d6950edd47158db65c85d47476fe654918b
Size
469KB
MD5
8c218c213f4951c636eba571d8ca1af2
SHA1
b2498f9f7915637484a0e2580a530ac3013926a2
SHA256
94a6ba1213734cda866e39c6aad32d6950edd47158db65c85d47476fe654918b
SHA512
4941b6b6c366ca3a1467dc709d2783e305a6ecf2782fa27a35f33a15d03d98683ba951b01f68fca7b1959e21cb72e3ca4cb327c8939134cf091b93e230566969
SSDEEP
12288:riHdQbpzvKygm8oFrngDpMH7BJRc04Yoqmb9Or:riHduvKyooFrngDY7jy04YiQr
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetCurrentProcessId
CreateDirectoryW
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
GetExitCodeProcess
GetLastError
WaitForSingleObject
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DecodePointer
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
RaiseException
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
GetModuleHandleW
GlobalLock
GlobalUnlock
lstrcpynW
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
CreateFileW
CloseHandle
FindClose
ReadFile
WriteFile
WritePrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
lstrlenW
GetPrivateProfileStringW
GetProcAddress
GetCurrentProcess
FreeLibrary
GetVersionExW
LoadLibraryW
Sleep
DeleteCriticalSection
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
GetACP
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
LoadLibraryExW
InterlockedFlushSList
RtlUnwindEx
RtlPcToFileHeader
OutputDebugStringW
InitializeSListHead
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetStringTypeW
GetCPInfo
LoadStringW
wsprintfW
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetTokenInformation
GetTokenInformation
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegDeleteValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
SHGetFolderPathW
DragQueryFileW
SHGetSpecialFolderPathW
SHChangeNotify
ReleaseStgMedium
IIDFromString
SHDeleteValueW
SHDeleteKeyW
PathFileExistsW
SHGetValueW
SHSetValueW
DestroyEnvironmentBlock
CreateEnvironmentBlock
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ