Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
acba4cb49e2382b58a4cd3834cc823aeac80a12ca7c88eda1c027aa3514a5a33.dll
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
acba4cb49e2382b58a4cd3834cc823aeac80a12ca7c88eda1c027aa3514a5a33.dll
Resource
win10v2004-20231130-en
Target
acba4cb49e2382b58a4cd3834cc823aeac80a12ca7c88eda1c027aa3514a5a33
Size
1.1MB
MD5
82c8cb95eb8a005da8b48e0061760fcf
SHA1
f8cb49c2458432c77f6ff7454b0569f42ec80faf
SHA256
acba4cb49e2382b58a4cd3834cc823aeac80a12ca7c88eda1c027aa3514a5a33
SHA512
d0555d3bb6a0e2b90d39bbb9a05f97a421fce71ff00bbdc09019f0849b864a182366311a203b561e2d5ce7ae1f7c71223462c645804ec9dfe1e1ff0694dac7d7
SSDEEP
24576:qnP/QnzJdDLa2Vr2gNfInaAzzgKQI4oRI4oYIH3nXH3Y:6+VdDLUaqsKQI4oRI4oYIH3nXH3Y
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapFree
HeapAlloc
GetStdHandle
GetFileType
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetProcessHeap
GetStringTypeW
SetFilePointerEx
SetStdHandle
HeapSize
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
DecodePointer
CloseHandle
CreateFileW
WriteConsoleW
?Addr@DIS@@QBE_KXZ
?CchFormatAddr@DIS@@QBEI_KPA_WI@Z
?CchFormatInstr@DIS@@QBEIPA_WI@Z
?Dist@DIS@@QBE?AW4DIST@1@XZ
?PdisNew@DIS@@SGPAV1@W4DIST@1@@Z
?PdisNew@DISARM64@@SGPAVDIS@@W4DIST@2@@Z
?PdisNew@DISARM@@SGPAVDIS@@W4DIST@2@@Z
?PdisNew@DISX86@@SGPAVDIS@@W4DIST@2@@Z
?PfncchaddrSet@DIS@@QAEP6GIPBV1@_KPA_WIPA_K@ZP6GI012I3@Z@Z
?PfncchfixupSet@DIS@@QAEP6GIPBV1@_KIPA_WIPA_K@ZP6GI01I2I3@Z@Z
?PfncchregSet@DIS@@QAEP6GIPBV1@W4REGA@1@PA_WI@ZP6GI012I@Z@Z
?PfncchregrelSet@DIS@@QAEP6GIPBV1@W4REGA@1@KPA_WIPAK@ZP6GI01K2I3@Z@Z
?PfndwgetregSet@DIS@@QAEP6G_KPBV1@W4REGA@1@@ZP6G_K01@Z@Z
?PvClient@DIS@@QBEPAXXZ
?PvClientSet@DIS@@QAEPAXPAX@Z
?PwostrstreamNew@wostrstream@DIS@@SGPAV12@PA_WI@Z
?PwostrstreamNew@wostrstream@DIS@@SGPAV12@XZ
?SetAddr64@DIS@@QAEX_N@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ