Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
5626b334db70ed76ff4d5b3bf1d70c2ada56b7ea8db86ed49fd932de9ed560d3.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5626b334db70ed76ff4d5b3bf1d70c2ada56b7ea8db86ed49fd932de9ed560d3.dll
Resource
win10v2004-20240226-en
Target
5626b334db70ed76ff4d5b3bf1d70c2ada56b7ea8db86ed49fd932de9ed560d3
Size
748KB
MD5
a96de9e54a528f930e7c6c00149fceb1
SHA1
ca5179e5e9163f29ba9a75dd5b2525dafc385d31
SHA256
5626b334db70ed76ff4d5b3bf1d70c2ada56b7ea8db86ed49fd932de9ed560d3
SHA512
8fb7078cb15e96f425064e1330e0aa8364e5eb56fa2b31675bb64319582ee2d8983697317ae7089944a30ae13cd747e56163f2c6fcf4caf3d85e821195c77f29
SSDEEP
12288:dR9XeTegd6VlKQa/s35D/NyoUUrhNjRVR6vVs:LEKg6lFa/s39ozyRVR6ds
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
HeapSize
GetProcessHeap
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
Sleep
GetTickCount
FreeLibrary
GetProcAddress
GetLogicalDriveStringsW
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
FindNextFileA
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
WaitForSingleObject
HeapFree
lstrlenW
CreateProcessW
GetVersionExW
VirtualQuery
GetCurrentProcessId
GetModuleFileNameA
EnterCriticalSection
LeaveCriticalSection
GlobalLock
GlobalUnlock
OutputDebugStringW
lstrcpynW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
HeapAlloc
HeapReAlloc
DecodePointer
CreateFileW
CreateDirectoryW
FindResourceW
CloseHandle
FindClose
ReadFile
WriteFile
SizeofResource
LoadResource
GetLastError
GetCurrentProcess
LockResource
RtlUnwind
WriteConsoleW
GetTimeZoneInformation
SetEndOfFile
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
ReadConsoleW
GetStdHandle
GetACP
GetModuleHandleExW
ExitProcess
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetFileType
RtlPcToFileHeader
RtlUnwindEx
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
VirtualFree
VirtualProtect
VirtualAlloc
LoadLibraryExW
GetModuleHandleA
TryEnterCriticalSection
GetStringTypeW
EncodePointer
SetLastError
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
QueryPerformanceCounter
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
CreatePopupMenu
InsertMenuW
SetMenuItemBitmaps
InsertMenuItemW
LoadBitmapW
wsprintfW
DeleteObject
RegDeleteValueW
RegDeleteKeyW
GetUserNameW
RegSetValueExW
LookupAccountSidW
GetTokenInformation
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
SHGetFolderPathW
ShellExecuteExW
DragQueryFileW
ReleaseStgMedium
PathAppendW
PathFileExistsA
PathFileExistsW
SHDeleteKeyW
PathFindExtensionW
StrStrIW
PathRemoveFileSpecW
PathRemoveFileSpecA
GetProcessImageFileNameW
EnumProcesses
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ