Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
1710250.dll
Resource
win10v2004-20231215-en
Target
1710250.dll
Size
2.3MB
MD5
6001559ff7fd64d454c7c8ac89a0c918
SHA1
90d679def7a82bad44cc7765e7083ac86ec8c6c8
SHA256
3d59a5b0fb59a48d65b6769250f2ee60c1ad2e64620f0e844ecfac65fa03f6d9
SHA512
407e83cb68b865522cb636c41fb52c2ee59010779d00fcbc61f6411509155d872d9bb1615cd761babd5987390eada28a091bcbff5494429efbafda8b7198b49d
SSDEEP
24576:tkNMHVUzUVk7rsYeZFHD/3M53HQEVEUZpp9HwTMy8N8ZTTMqRGvlN2:AYVIyBDWXnp9MToBvlN2
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAlloc
LoadLibraryA
InterlockedDecrement
GetTickCount
ReadFile
GetCurrentProcess
VirtualFree
SetFilePointer
InterlockedIncrement
GetCurrentThread
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
GetProcessHeap
HeapAlloc
CopyFileW
MoveFileW
GetModuleFileNameW
lstrlenW
WriteFile
UnmapViewOfFile
GetComputerNameW
CreateFileW
WideCharToMultiByte
ReleaseMutex
LocalFree
SizeofResource
MapViewOfFile
LockResource
OpenFileMappingW
MultiByteToWideChar
LoadResource
CreateFileMappingW
FindResourceW
WaitForSingleObject
DeleteFileW
CreateMutexW
CloseHandle
SetFileAttributesW
ProcessIdToSessionId
Process32NextW
GetSystemTimeAsFileTime
GetCurrentProcessId
TerminateProcess
FindResourceExW
OpenProcess
FreeLibrary
GetProcAddress
FreeEnvironmentStringsA
GetModuleFileNameA
FlushFileBuffers
Process32FirstW
InterlockedExchange
CreateToolhelp32Snapshot
GetLastError
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetConsoleMode
GetConsoleCP
IsValidCodePage
GetOEMCP
TlsFree
TlsSetValue
InterlockedExchangeAdd
LoadLibraryW
HeapFree
FindClose
SetFileTime
FindNextFileW
LocalAlloc
GetFileTime
FindFirstFileW
TlsAlloc
RemoveDirectoryW
TlsGetValue
HeapCreate
SetStdHandle
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
QueryPerformanceCounter
QueryPerformanceFrequency
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapReAlloc
HeapSize
Sleep
ReleaseSemaphore
CreateSemaphoreW
lstrcpynW
lstrcpyW
CreateFileA
GetFileAttributesW
SetLastError
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetModuleHandleA
ExitProcess
WriteConsoleA
GetDesktopWindow
UnregisterClassA
CryptGetHashParam
CryptDestroyHash
CryptCreateHash
CryptAcquireContextW
CryptReleaseContext
CryptHashData
OpenThreadToken
RegGetKeySecurity
RevertToSelf
ImpersonateLoggedOnUser
ConvertSidToStringSidW
RegSetValueExW
SetSecurityDescriptorSacl
RegCreateKeyExW
GetSecurityDescriptorSacl
LookupAccountNameW
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteKeyW
SetSecurityDescriptorDacl
RegOpenKeyExW
InitializeSecurityDescriptor
OpenProcessToken
GetTokenInformation
IsValidSid
SetTokenInformation
DuplicateTokenEx
RegQueryValueExW
RegSetKeySecurity
RegOpenKeyW
SHGetFolderPathW
StringFromCLSID
CoTaskMemFree
SysAllocString
VariantClear
SysStringLen
SysFreeString
PathFileExistsW
PathIsDirectoryW
PathRemoveFileSpecW
PathStripPathW
WTSQuerySessionInformationW
WTSFreeMemory
WTSCloseServer
WTSOpenServerW
NetWkstaUserEnum
NetApiBufferFree
UuidToStringW
RpcStringFreeW
UuidCreate
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ