Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
052d5fbb08676743393cba8194a10523.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
052d5fbb08676743393cba8194a10523.dll
Resource
win10v2004-20231215-en
Target
052d5fbb08676743393cba8194a10523
Size
271KB
MD5
052d5fbb08676743393cba8194a10523
SHA1
f2054c1490fca6ac57009053794cd6b460b210e9
SHA256
1269ba8b32d6469ae83806e2da9ac4cb6cdff2dc2c1fc54edc4997b699434a2c
SHA512
0cc6062be06b19c89b9f08ef158afd43e423ebd4c8028678b5090675554013f5357ede1b77a4395b6bea50a965f1ba6815117d5397e9bf8c5d2db9292a419738
SSDEEP
3072:814HvJ/fFRnhfRcwqLU14CTdcUs+FHea/yTktaG++bStSgMbwoy28oKXL:81Ih/bjcwMSTeUFHezkz+Wn0b
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
DeleteCriticalSection
LoadLibraryW
GetProcAddress
CloseHandle
GetModuleHandleW
CreateFileW
FreeLibrary
GetFileSize
ReadFile
GetVersionExW
SetFilePointer
WriteFile
FlushFileBuffers
ExpandEnvironmentStringsW
LoadLibraryA
InitializeCriticalSection
LeaveCriticalSection
VirtualQuery
VirtualProtect
GetThreadContext
SetThreadContext
Thread32First
Thread32Next
OpenThread
CreateToolhelp32Snapshot
GetCurrentThreadId
GetCurrentProcessId
SuspendThread
ResumeThread
VirtualFree
VirtualAlloc
GetSystemInfo
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
WideCharToMultiByte
GetModuleFileNameA
MultiByteToWideChar
ReadConsoleW
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
OutputDebugStringW
LoadLibraryExW
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetFileType
GetOEMCP
GetACP
IsValidCodePage
GetSystemTimeAsFileTime
GetStringTypeW
EncodePointer
DecodePointer
Sleep
HeapFree
GetCommandLineA
HeapAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
GetCPInfo
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
GetModuleHandleExW
HeapSize
GetStdHandle
GetModuleFileNameW
GetProcessHeap
RegOpenKeyExA
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegQueryValueExA
SHGetFolderPathW
ord165
CoTaskMemFree
send
getsockopt
recv
WSARecv
WSASend
ioctlsocket
setsockopt
WSAGetLastError
PathRemoveFileSpecW
PathAppendW
PathStripPathW
PathRemoveFileSpecA
PathAppendA
AddToRestricted
InstallHooks
Set_localStoreDefaultValue
Set_localStoreFileName
Set_localStorePath
UninstallHooks
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ