Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
bcryptprimitives.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcryptprimitives.dll
Resource
win10v2004-20240508-en
Target
bcryptprimitives.dll
Size
243KB
MD5
6b98026761228f913e9fa3f974920a20
SHA1
89a1464406ae48b1ba78f1630b913b75b46ff0f2
SHA256
d80dcec4b5554e84491b06c624098123033b840f88157ef402edad2163b0a734
SHA512
758fb200187acd7628ba438477edd810c60eef1024b99316ebf9a2f0b3e6c1c5377e25d3cecd70d7f9befae8f5aa544d060133868f65772a9fc9ddae9831ffbb
SSDEEP
6144:1fb/qqDATG+sC90/OVHR/kFjUE60LCD4EDMK57Y/:1TiqUTG+sC0/OP/kFjU4Cx4N
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
bcryptprimitives.pdb
NtQueryValueKey
NtClose
RtlInitUnicodeString
RtlAllocateHeap
RtlFreeHeap
_alloca_probe
_vsnwprintf
memmove
NtOpenFile
RtlInitializeCriticalSection
RtlImageNtHeader
RtlUnwind
wcscpy_s
memset
memcpy
RtlUnhandledExceptionFilter
NtTerminateProcess
NtOpenKey
_chkstk
SetLastError
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
RtlMoveMemory
CloseHandle
DeviceIoControl
HeapAlloc
InterlockedIncrement
DeleteCriticalSection
GetProcessHeap
HeapFree
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
InterlockedCompareExchange
GetVersion
VirtualQuery
GetSystemInfo
GetModuleHandleW
GetProcAddress
VirtualAlloc
VirtualProtect
IsProcessorFeaturePresent
SystemFunction040
SystemFunction041
BCryptGetProperty
BCryptGenRandom
BCryptDestroyHash
BCryptFinishHash
BCryptHashData
BCryptCreateHash
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptGetFipsAlgorithmMode
BCryptDecrypt
GetAsymmetricEncryptionInterface
GetCipherInterface
GetHashInterface
GetRngInterface
GetSecretAgreementInterface
GetSignatureInterface
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ