Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
f3c7d1d8aa0ce0513e463df4c63b4680_dll32_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f3c7d1d8aa0ce0513e463df4c63b4680_dll32_JC.dll
Resource
win10v2004-20230915-en
Target
f3c7d1d8aa0ce0513e463df4c63b4680_dll32_JC.dll
Size
2.6MB
MD5
f3c7d1d8aa0ce0513e463df4c63b4680
SHA1
fa1a24f796f811925a2e5554a87b574af5e99916
SHA256
02f9e7524863c8e6a0650e4270de05128a584a9ab8cf2f4dec775912567bdd8d
SHA512
8346b0a1b6ad32936cee8ad967ead5cda5f94b4a43196cd6466e16442f9542fbf96e78b047e8e8bb93403088afeeacf5f7cbb76f08f5e4a3af7ddd3097d319ad
SSDEEP
49152:xxopfVEoN6yrXlMRAr9TaI+y6sZOLmSFbXjwkmQuQez31BE/:xxopfqo3jX1aIj8xLO
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
StrokeAndFillPath
GetWinMetaFileBits
PathStripToRootW
ICDecompress
DosDateTimeToFileTime
GetSystemTimeAsFileTime
GetExitCodeProcess
GetUserDefaultLCID
GetModuleHandleW
GetModuleFileNameA
OutputDebugStringA
GetBinaryTypeA
SetLastError
IsDBCSLeadByte
ResetEvent
FindVolumeClose
HeapDestroy
MprAdminInterfaceTransportRemove
NetGroupAdd
SHBrowseForFolderA
memset
ShowCursor
CallNextHookEx
UnhookWindowsHookEx
GetComboBoxInfo
LZOpenFileW
VerQueryValueA
ImpersonateLoggedOnUser
EalEsneataysxxt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ