Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
bfcf5f616b1b73700e25ed79a51f6592dcb59f47ee88ac584a9ac804cc86652d.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bfcf5f616b1b73700e25ed79a51f6592dcb59f47ee88ac584a9ac804cc86652d.dll
Resource
win10v2004-20240419-en
Target
bfcf5f616b1b73700e25ed79a51f6592dcb59f47ee88ac584a9ac804cc86652d
Size
1.7MB
MD5
964af3c92eefb8915bf3f4a728f2415f
SHA1
7f79538ace0feed057904a010d6f29c35b30be41
SHA256
bfcf5f616b1b73700e25ed79a51f6592dcb59f47ee88ac584a9ac804cc86652d
SHA512
fc831b50d28ba22cee88d4aac0904f563d3963a62be14848f9d1d151c71cce3d3d599dd0cb6aa947b96d895d0d28e22a8a0ac26af83d7da7f0fbace637bc63a4
SSDEEP
24576:+HrTgQR4wdBgwE6SHUf4T1bmMb4R3pNcF/X2yon:+HV4rwE6TMb442yon
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\Users\Clon_\OneDrive\Masaüstü\Hile Koruması\crysus\Debug\Crysus.pdb
OpenProcess
K32EnumProcesses
K32EnumProcessModules
K32GetModuleFileNameExA
ReadProcessMemory
Process32First
Process32Next
FindNextFileA
GetTickCount
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
ResumeThread
FindFirstFileExW
GetTimeZoneInformation
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
DeleteFileW
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
WaitForSingleObject
Module32Next
Module32First
CreateToolhelp32Snapshot
LoadLibraryExA
GetProcAddress
FreeLibrary
GetModuleHandleA
GetCurrentProcessId
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
CloseHandle
FindFirstFileA
FindClose
CreateThread
TerminateProcess
GetCurrentProcess
FindNextFileW
Sleep
GetLocaleInfoW
LCMapStringW
FormatMessageA
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
LocalFree
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
VirtualQuery
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
HeapValidate
GetSystemInfo
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetStdHandle
WriteConsoleW
GetCurrentThread
HeapReAlloc
HeapSize
HeapQueryInformation
WriteFile
OutputDebugStringW
SetConsoleCtrlHandler
GetTempPathW
GetDateFormatW
GetTimeFormatW
CompareStringW
SetEndOfFile
LoadCursorA
SetWindowLongA
GetWindowLongA
GetClientRect
EndPaint
BeginPaint
UpdateWindow
GetSystemMetrics
ShowWindow
DestroyWindow
LoadImageA
RegisterClassExA
UnregisterClassA
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
FindWindowA
FindWindowExA
SendMessageA
WindowFromPoint
GetWindowTextA
MessageBoxA
CreateWindowExA
SelectObject
GetStockObject
DeleteObject
DeleteDC
CreateCompatibleDC
BitBlt
GetObjectA
SetSecurityInfo
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetLengthSid
FreeSid
AllocateAndInitializeSid
AddAccessDeniedAce
AddAccessAllowedAce
OpenProcessToken
GetUserNameA
ShellExecuteA
Crysus
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ