Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
f1628aca086be5ed0274b86100e961498f5554c4425299c9f1915b941c58bdf9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f1628aca086be5ed0274b86100e961498f5554c4425299c9f1915b941c58bdf9.dll
Resource
win10v2004-20231215-en
Target
f1628aca086be5ed0274b86100e961498f5554c4425299c9f1915b941c58bdf9
Size
3.2MB
MD5
c880ddf12074fe9b62e6c9c841b17acc
SHA1
39e159231afce5f66b37a55d130a2d2a15f47a9d
SHA256
f1628aca086be5ed0274b86100e961498f5554c4425299c9f1915b941c58bdf9
SHA512
381245dcb46cf42b8154123ca04b0166415fb09cdbb2b99819c545f22c2de2a2e019ca2ee89c99310781b5a6e40551e42d21fb0a69ca749593bc69939a3ef7aa
SSDEEP
49152:AX+zmlREWCeuvj3wsPT503w0ggggMUyaFxIhtZFo0+3c88UAltx5+WHvghCcS8Rx:be/AyycxU7Fo0+lUsCcS9ghzF
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CopyFileW
SystemTimeToFileTime
ConvertThreadToFiber
ConvertFiberToThread
FreeLibrary
GetModuleFileNameA
FindResourceW
LoadResource
LockResource
SizeofResource
GetTickCount
MoveFileExW
GlobalMemoryStatus
CreateFiber
GetNativeSystemInfo
SwitchToFiber
SetConsoleMode
ReadConsoleA
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
DeleteCriticalSection
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetEnvironmentVariableA
DeleteFiber
LoadLibraryW
CompareFileTime
SleepEx
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
FormatMessageW
GetStringTypeW
QueryPerformanceCounter
QueryPerformanceFrequency
SetLastError
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
FindResourceExW
VirtualQuery
MoveFileW
InitializeCriticalSection
ReleaseMutex
MapViewOfFile
GetSystemDirectoryW
CreateMutexA
CreateMutexW
OpenMutexA
OpenMutexW
CreateFileMappingW
OpenFileMappingW
GetFileSize
WriteFile
ReadFile
CreateFileW
GetEnvironmentVariableW
GetDriveTypeW
GetTempPathW
GetDiskFreeSpaceExW
CreateDirectoryA
CreateDirectoryW
GetFileAttributesA
GetFileAttributesW
FindFirstFileA
FindNextFileA
RemoveDirectoryW
CreateFileA
SetFileAttributesW
ResetEvent
SetErrorMode
GetSystemInfo
GetVersionExW
GlobalAlloc
GlobalFree
GetFileInformationByHandle
GetHandleInformation
lstrcmpiW
lstrlenW
CreateProcessW
DeviceIoControl
GetSystemDirectoryA
VirtualProtect
LoadLibraryA
IsBadReadPtr
GetThreadLocale
SetFileTime
SetCurrentDirectoryA
SetFilePointer
WaitForSingleObjectEx
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
SetProcessAffinityMask
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
WaitForMultipleObjectsEx
RtlUnwind
GetTimeZoneInformation
ExitProcess
GetModuleHandleExW
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
ExitThread
ResumeThread
GetACP
GetStdHandle
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
ReadConsoleW
SetConsoleCtrlHandler
FindFirstFileExA
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
SetEndOfFile
WriteConsoleW
GetFileAttributesExW
OutputDebugStringA
RtlCaptureStackBackTrace
GetSystemTime
FindClose
FindNextFileW
FindFirstFileW
VerifyVersionInfoW
VerSetConditionMask
SetEvent
OpenEventW
CreateEventW
WaitForSingleObject
Sleep
WaitForMultipleObjects
GetCommandLineW
DeleteFileW
GetCurrentThreadId
GetModuleFileNameW
WideCharToMultiByte
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
InterlockedIncrement
InterlockedDecrement
GetLastError
QueryDosDeviceW
GetLogicalDriveStringsW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
VirtualAlloc
LocalFree
LocalAlloc
VirtualFree
CloseHandle
GetModuleHandleW
GetProcAddress
OpenProcess
UnmapViewOfFile
GetCurrentProcessId
UpdateWindow
UnregisterClassW
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
LoadStringW
AllowSetForegroundWindow
GetDesktopWindow
GetWindowThreadProcessId
GetSystemMetrics
PostMessageW
PostQuitMessage
SetWindowPos
FindWindowW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
EnumDependentServicesW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfig2W
FreeSid
AllocateAndInitializeSid
RegSetKeySecurity
RegOpenKeyExA
RegEnumKeyExW
RegEnumKeyExA
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetSidSubAuthorityCount
GetSidSubAuthority
SetTokenInformation
GetTokenInformation
BuildExplicitAccessWithNameW
SetNamedSecurityInfoA
GetNamedSecurityInfoA
SetEntriesInAclW
GetUserNameA
LookupPrivilegeValueW
LookupAccountNameA
AdjustTokenPrivileges
OpenProcessToken
ImpersonateLoggedOnUser
GetUserNameW
RevertToSelf
RegQueryValueExW
StartServiceW
RegDeleteKeyW
RegDeleteValueW
RegQueryValueExA
QueryServiceConfigW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
CryptCreateHash
CryptDestroyHash
CryptSignHashW
CryptGenRandom
CryptEnumProvidersW
ShellExecuteExW
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
SHGetSpecialFolderPathW
SHGetFolderPathA
SysAllocStringByteLen
VariantInit
SysFreeString
SysAllocString
SysStringByteLen
VariantClear
PathFileExistsA
SHGetValueW
SHSetValueW
PathFindFileNameA
PathRemoveFileSpecW
ord176
PathFindExtensionW
PathCombineW
PathRemoveExtensionW
PathFindFileNameW
PathIsSameRootW
PathAppendW
SHDeleteKeyW
PathFileExistsW
CertGetCertificateContextProperty
CertEnumCertificatesInStore
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreW
CertDuplicateCertificateContext
CertOpenStore
CertFreeCertificateContext
CertGetNameStringW
CertFindCertificateInStore
CryptMsgClose
CertCloseStore
CryptMsgGetParam
CryptQueryObject
EnumProcesses
GetModuleFileNameExW
GetProcessImageFileNameW
EnumProcessModules
GetFileVersionInfoSizeA
VerQueryValueW
VerQueryValueA
GetFileVersionInfoW
GetFileVersionInfoA
GetFileVersionInfoSizeW
MiniDumpWriteDump
DestroyEnvironmentBlock
CreateEnvironmentBlock
WTSQueryUserToken
GetAdaptersInfo
ObtainUserAgentString
CoInitialize
CoCreateGuid
CoCreateInstance
CoInitializeEx
CoUninitialize
sendto
recvfrom
getsockopt
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
gethostname
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
WSACloseEvent
htonl
accept
connect
bind
WSAGetLastError
send
recv
closesocket
WSACleanup
getsockname
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
htons
getpeername
gethostbyname
getnameinfo
WSAStartup
shutdown
ord301
ord147
ord133
ord79
ord142
ord167
ord127
ord27
ord26
ord117
ord208
ord216
ord14
ord46
ord145
ord219
ord41
AyspDQBD
Run
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ