Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
144fa21ec0c4304ac5ad08eda44ee0cd.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
144fa21ec0c4304ac5ad08eda44ee0cd.dll
Resource
win10v2004-20231222-en
Target
144fa21ec0c4304ac5ad08eda44ee0cd
Size
696KB
MD5
144fa21ec0c4304ac5ad08eda44ee0cd
SHA1
7af22da06a8f80b6390dc28c0687219c14234df2
SHA256
d1a7162c0768f7788f1e31a2ce910531f6f82f0721a5baccf050013c6c12d2f1
SHA512
c8fde57662775d1514ee94ed99886dd2d7c8a5a95e8f39528d3f26a3b6269bc166fb49decdd23e1470846f57c9672300fb550c8a49a547c2b2b42668c7ca7d8e
SSDEEP
12288:wZRM6+u6N1OitlDXMK4J/A/IBkrfM3eEq4lzNiD1NaCQxVW2:wZRM7tZMtJ/A/IBkrfM3eEq4RN4vQxV9
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
inet_addr
recvfrom
htons
closesocket
bind
select
sendto
setsockopt
gethostbyname
gethostname
WSAStartup
socket
WSACleanup
WSAGetLastError
htonl
accept
ioctlsocket
__WSAFDIsSet
freeaddrinfo
inet_ntoa
getsockname
listen
ntohs
recv
connect
send
getpeername
getsockopt
WSASetLastError
getaddrinfo
GetModuleFileNameA
CreateFileA
GetCurrentProcessId
GetCurrentThreadId
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ReleaseSemaphore
GetStdHandle
GetSystemTimeAsFileTime
CreateSemaphoreW
UnmapViewOfFile
GetConsoleScreenBufferInfo
CreateFileMappingW
GetSystemInfo
GetVersionExW
FindFirstFileExW
FindClose
FileTimeToSystemTime
MapViewOfFile
CloseHandle
Sleep
GetFileInformationByHandle
FileTimeToLocalFileTime
WaitForSingleObject
GetLastError
CreateEventA
SetConsoleTextAttribute
CreateMutexW
FreeLibraryAndExitThread
WideCharToMultiByte
MultiByteToWideChar
OutputDebugStringW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
GetFullPathNameW
CreateDirectoryA
GetTickCount
GetFileAttributesW
CreateDirectoryW
GetCurrentDirectoryW
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
SetFilePointer
GetModuleHandleA
lstrlenW
ExpandEnvironmentStringsA
LoadLibraryA
PeekNamedPipe
WaitForMultipleObjects
FormatMessageA
SleepEx
GetFileSize
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
DeleteFileA
GetFileAttributesA
EncodePointer
DecodePointer
GetStringTypeW
HeapFree
RaiseException
RtlUnwind
CreateThread
ExitThread
ResumeThread
ReadFile
HeapAlloc
GetProcAddress
LoadLibraryExW
GetCommandLineA
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsProcessorFeaturePresent
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapSize
IsDebuggerPresent
WriteFile
GetConsoleCP
GetConsoleMode
GetProcessHeap
IsValidCodePage
GetACP
GetOEMCP
ReadConsoleW
SetFilePointerEx
GetFileType
GetModuleFileNameW
FlushFileBuffers
DeleteFileW
GetTimeZoneInformation
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapReAlloc
FreeLibrary
SetStdHandle
WriteConsoleW
CreateFileW
SetEndOfFile
SetEnvironmentVariableA
SetEvent
lstrcmpiW
LoadLibraryExA
CreateProcessA
GetSystemDirectoryA
GetTempPathA
GetCurrentDirectoryA
SetFileAttributesA
wsprintfW
GetSystemMetrics
CryptAcquireContextA
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
RegOpenKeyExA
RegCloseKey
CryptReleaseContext
CoInitializeSecurity
CoCreateGuid
CoUninitialize
CoInitializeEx
CoCreateInstance
PathIsDirectoryA
ord156
GetAdaptersInfo
GetAdaptersAddresses
ord60
ord50
ord41
ord22
ord26
ord27
ord211
ord33
ord35
ord79
ord30
ord200
ord301
ord46
ord32
ord143
SHGetSpecialFolderPathA
ShellExecuteA
SafeArrayGetDim
VariantClear
VariantInit
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SysAllocString
SysFreeString
rundll32dllfun
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ