Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
16266878bd91f49edf761d24da6ca739.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16266878bd91f49edf761d24da6ca739.dll
Resource
win10v2004-20231215-en
Target
16266878bd91f49edf761d24da6ca739
Size
769KB
MD5
16266878bd91f49edf761d24da6ca739
SHA1
d781313deab4481692d005bf9df7c18bb703bcad
SHA256
158421a4a53f8277a728e41034220665ed27d3368775c50f00293d7164a7700d
SHA512
720e3f76e994f4acb806c982a79ea0f3bd5ea29371a633f28dcf5b321b2f37a4db9cf22692889e21e5b8ac3ae9ae84e26c99106fc38ae49594564edbc7c3191a
SSDEEP
6144:hQ+T/XQzmvuo9XEj5A4/F7yWeOnvlT9f5DJvE7Y0Jr5+W6BO0h9SH1BIKcriV2bD:DzvzWAtWzB2Fjr3+l3a6M4CTLQtmwz
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
CoInternetGetSession
URLDownloadToCacheFileA
HttpSendRequestA
InternetQueryOptionA
HttpOpenRequestA
InternetSetOptionA
InternetReadFile
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetCrackUrlA
HttpQueryInfoA
inet_ntoa
WSAStartup
WSACleanup
gethostbyname
WideCharToMultiByte
FlushInstructionCache
GetCurrentProcess
RaiseException
GetCurrentThreadId
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetFileSize
GetFileSizeEx
WriteFile
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
FindClose
CloseHandle
GetSystemTimeAsFileTime
ExpandEnvironmentStringsA
CreateDirectoryA
CreateFileA
FindFirstFileA
LocalFree
GetModuleHandleA
GetCurrentProcessId
CreateThread
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
SetEvent
ReleaseMutex
WaitForSingleObject
WaitForMultipleObjects
Sleep
lstrcpyA
lstrlenA
CreateMutexA
OpenMutexA
CreateEventA
DeleteFileA
FindNextFileA
FindFirstChangeNotificationA
LocalAlloc
FreeLibrary
GetProcAddress
OpenProcess
TerminateProcess
LoadLibraryA
GetVersion
GetVersionExA
InitializeCriticalSection
GetACP
DecodePointer
FindResourceExW
lstrcmpiA
LoadLibraryExA
GetModuleFileNameA
GetModuleHandleW
FindResourceA
IsDBCSLeadByte
VirtualProtect
IsValidCodePage
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
GetCPInfo
GetCommandLineA
VirtualQuery
GetSystemInfo
IsProcessorFeaturePresent
IsDebuggerPresent
AreFileApisANSI
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
GetStringTypeW
VirtualFree
VirtualAlloc
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetOEMCP
GetConsoleCP
GetConsoleMode
MoveFileExW
GetTimeZoneInformation
FindResourceW
GetTickCount
SizeofResource
LoadResource
DisableThreadLibraryCalls
LockResource
GetFileType
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
SetEnvironmentVariableA
LoadLibraryExW
LoadLibraryW
SetFilePointerEx
SetStdHandle
WriteConsoleW
CreateFileW
ReadConsoleW
EncodePointer
RegisterClassExA
GetMenuItemInfoA
CreateWindowExA
CallWindowProcA
UnregisterClassA
GetClassNameA
BringWindowToTop
DefWindowProcA
GetWindowLongPtrA
PostMessageA
GetClassInfoExA
keybd_event
GetWindowTextA
SystemParametersInfoA
AllowSetForegroundWindow
SetWindowLongPtrA
GetDesktopWindow
LoadCursorA
GetWindowThreadProcessId
SendMessageA
AttachThreadInput
SetWindowPos
GetForegroundWindow
SetForegroundWindow
GetWindowRect
GetParent
FindWindowA
FindWindowExA
UnhookWindowsHookEx
DestroyIcon
MessageBoxA
SendMessageTimeoutA
CharNextA
CharNextW
SetTimer
KillTimer
RegisterWindowMessageA
IsWindow
IsWindowVisible
CreatePopupMenu
GetMenuItemCount
InsertMenuA
DeleteMenu
TrackPopupMenuEx
GetKeyboardState
GetSidSubAuthorityCount
RegOpenKeyExA
RegEnumValueA
RegSetValueExA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSidSubAuthority
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegCloseKey
SHFileOperationA
ShellExecuteA
ShellExecuteExA
SHGetFolderPathA
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CoGetClassObject
CoInitializeEx
CoUninitialize
CoCreateGuid
CLSIDFromProgID
CoTaskMemRealloc
CoTaskMemFree
VariantCopy
VariantChangeType
SysAllocStringLen
DispCallFunc
UnRegisterTypeLi
RegisterTypeLi
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
VariantClear
VariantInit
SysStringLen
SysAllocString
SysFreeString
UrlEscapeA
GdiplusShutdown
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ