Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
4944e66619b29fcbbfa85415f2653f02.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4944e66619b29fcbbfa85415f2653f02.dll
Resource
win10v2004-20231215-en
Target
4944e66619b29fcbbfa85415f2653f02
Size
141KB
MD5
4944e66619b29fcbbfa85415f2653f02
SHA1
b98ad0e879c717aadf77231bf99bfe522dace1f4
SHA256
1497b0273e1508c980354ee077511fae3d49e3ab3eabe887df940d1f4a170eac
SHA512
508cca236f29abe244a76afcb839ecd93f497ac7819b948d55bef6a7f00d4be22c6ae969e8313f4bcf033dcfaca7253a238d983a2ff99e5d4ab1cfac7c157ac0
SSDEEP
3072:oAWJWfVECxUz1dnMiwTjbW8hsXbedmRxVHVTmH3Vfv/Oh2:0JWp0nMiSbkbedOxpJmHdvl
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
DeleteFileA
SetLastError
GetLastError
lstrcpynA
lstrcmpiA
WritePrivateProfileSectionA
LockResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleFileNameA
GetModuleHandleW
GetProcAddress
lstrlenW
GetModuleHandleA
GetCurrentProcessId
lstrcmpA
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
RaiseException
VirtualQuery
VirtualProtect
CreateDirectoryA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetSystemDirectoryA
MultiByteToWideChar
GetCommandLineA
WideCharToMultiByte
SizeofResource
IsDBCSLeadByte
GetModuleFileNameW
FreeLibrary
InitializeCriticalSectionAndSpinCount
DisableThreadLibraryCalls
lstrcmpiW
GetLocalTime
SystemTimeToFileTime
CompareFileTime
CreateFileA
WriteFile
FlushFileBuffers
CreateMutexA
ResetEvent
SetThreadPriority
ResumeThread
WaitForMultipleObjects
ReleaseMutex
CreateFileMappingA
WaitForSingleObject
MapViewOfFile
WritePrivateProfileStringA
LoadLibraryA
GetNativeSystemInfo
GetDriveTypeA
GetFileAttributesA
GetFileSize
ReadFile
LocalFree
GetStringTypeW
LCMapStringW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
SetHandleCount
HeapDestroy
HeapCreate
HeapReAlloc
GetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
RtlUnwind
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CreateThread
ExitThread
GetSystemInfo
DecodePointer
EncodePointer
GetPrivateProfileStringA
SetEvent
GetPrivateProfileIntA
lstrcatA
LeaveCriticalSection
EnterCriticalSection
lstrcpyA
DeleteCriticalSection
CloseHandle
InitializeCriticalSection
CreateEventA
lstrlenA
VerifyVersionInfoW
VerSetConditionMask
GetConsoleMode
SetStdHandle
WriteConsoleW
UnmapViewOfFile
CreateFileW
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
GetConsoleCP
SetFilePointer
LoadLibraryW
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
UnregisterClassA
GetKeyboardType
SetTimer
KillTimer
CharNextA
SetWindowLongW
GetWindowLongA
GetWindowLongW
CreateWindowExA
DefWindowProcA
CallWindowProcW
CallWindowProcA
LoadCursorA
GetClassInfoExA
RegisterClassExA
SetWindowLongA
DestroyWindow
DefWindowProcW
PostMessageA
IsWindow
PeekMessageA
GetClassNameA
GetWindowThreadProcessId
EnumWindows
wsprintfA
MessageBoxA
RegQueryInfoKeyA
RegEnumKeyExA
RegQueryInfoKeyW
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
CoCreateInstance
CoTaskMemFree
StringFromGUID2
CLSIDFromString
CoTaskMemRealloc
CoTaskMemAlloc
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
SysAllocString
SysStringByteLen
SysAllocStringLen
VariantInit
VariantClear
VariantChangeTypeEx
SysStringLen
LoadRegTypeLi
SysFreeString
SHRegQueryUSValueA
SHRegWriteUSValueA
SHRegCreateUSKeyA
SHRegDeleteUSValueA
SHRegCloseUSKey
SHRegOpenUSKeyA
PathAppendA
UuidFromStringA
UuidFromStringW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ