Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
029372f8a4f239dc1966e6af19440031.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
029372f8a4f239dc1966e6af19440031.dll
Resource
win10v2004-20231222-en
Target
029372f8a4f239dc1966e6af19440031
Size
69KB
MD5
029372f8a4f239dc1966e6af19440031
SHA1
35b7c42eb4e18868f83c331f3ee040690b39123e
SHA256
a7a0268745db5da68271265cf4ceb177019518eaa1abe2aaa5c3bc36e4531d03
SHA512
8aba62409f1570dbdc61929c98d6eb69a68d0911e893c6e4fd90ab08df6d58cc5deaee312d28ef99ee87778f70dbb1f2a8870084010ceef8c38e2d8297961283
SSDEEP
1536:xnUEUv91j2IHAIsQKC+fbTuzfsg/r6IlUl24nP:xnpUv9VXHAexiuzfvr6IlUU4P
ExtKeyUsageCodeSigning
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Netbios
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
Sleep
OutputDebugStringA
CloseHandle
CreateFileA
GetProcAddress
LoadLibraryA
VirtualProtect
ResetEvent
WaitForSingleObject
Process32Next
Process32First
CreateToolhelp32Snapshot
ReadFile
GetSystemDirectoryA
WriteFile
SetFilePointer
GetCurrentProcess
DuplicateHandle
OpenProcess
GetFileSize
DeleteFileA
lstrcatA
lstrcmpA
GetLocalTime
CreateEventA
SetEvent
CreateThread
OpenEventA
GetTempPathA
GetCommandLineW
FindClose
FindNextFileA
FindFirstFileA
CreateRemoteThread
Module32Next
Module32First
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrcpynA
InterlockedDecrement
InterlockedIncrement
lstrlenA
GetModuleFileNameA
DisableThreadLibraryCalls
lstrcpyA
GetCurrentProcessId
lstrcmpiA
SetFileAttributesA
EnumWindows
GetWindowThreadProcessId
EnumChildWindows
SetWindowLongA
SetForegroundWindow
GetClassNameA
CharNextA
FindWindowExA
wvsprintfA
SetWindowTextA
wsprintfA
CallWindowProcA
SendMessageA
FindWindowA
GetClientRect
GetWindowLongA
GetWindowTextA
RegCreateKeyExA
InitializeSecurityDescriptor
InitializeAcl
LookupAccountNameA
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegOpenKeyA
RegSetKeySecurity
RegEnumValueA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
SHGetFolderPathA
CommandLineToArgvW
ShellExecuteA
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
CoInitialize
StringFromGUID2
CoTaskMemAlloc
SysStringLen
LoadRegTypeLi
VarUI4FromStr
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
PathFindExtensionA
wnsprintfA
SHDeleteKeyA
SHSetValueA
SHGetValueA
WSACleanup
gethostbyname
send
socket
htons
inet_addr
connect
closesocket
WSAStartup
??2@YAPAXI@Z
strchr
strlen
sprintf
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_initterm
_adjust_fdiv
__CppXcptFilter
__security_error_handler
_strlwr
_stricmp
??_U@YAPAXI@Z
realloc
wcsncpy
__CxxFrameHandler
strstr
strrchr
_purecall
??_V@YAXPAX@Z
??3@YAXPAX@Z
memset
_CxxThrowException
memcpy
_except_handler3
_resetstkoflw
free
malloc
memcmp
AfxFindMemoryInSky
AfxReplaceText
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ