Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
f2890683fe9f42aab12de98ac7463651cff88d73925e4436fc06a122c463e4f3.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f2890683fe9f42aab12de98ac7463651cff88d73925e4436fc06a122c463e4f3.dll
Resource
win10v2004-20240508-en
Target
f2890683fe9f42aab12de98ac7463651cff88d73925e4436fc06a122c463e4f3
Size
181KB
MD5
4ad8174215eee7e55a5251df1832aea9
SHA1
130d110ecb3051c546becaec93949cc6c7cfd35d
SHA256
f2890683fe9f42aab12de98ac7463651cff88d73925e4436fc06a122c463e4f3
SHA512
5bbb7119c87f096a860b623c23f27ffbe02567a6a07ae99d96b57af34fb91236dd7cbbe04e3e510379c7dd035a54606b5dc9ff7ad60a9145c627415767b9a087
SSDEEP
3072:hWtHUXiRYzNzcvl6lNY2bv2lQBV+UdE+rECWp7hKxFm:h6MiUzcvOPBV+UdvrEFp7hKxFm
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
bdcore.dll.pdb
SetErrorMode
LoadLibraryA
FreeLibrary
GetProcAddress
CloseHandle
GetFileSize
ReadFile
WriteFile
SetFilePointer
GetFileType
CreateFileA
GetLastError
GetModuleFileNameA
GetSystemDirectoryA
GetFileAttributesA
GetTempPathA
WideCharToMultiByte
MultiByteToWideChar
SetLastError
GetFullPathNameA
UnmapViewOfFile
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
SetFileAttributesA
SetEndOfFile
RemoveDirectoryA
MoveFileExA
MoveFileA
MapViewOfFile
LeaveCriticalSection
InitializeCriticalSection
FormatMessageA
GetWindowsDirectoryA
GetVersionExA
GetSystemInfo
GetStdHandle
GetShortPathNameA
GetModuleHandleA
FlushFileBuffers
FindNextFileA
FindFirstFileA
FindClose
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateFileMappingA
CreateDirectoryA
CopyFileA
VirtualAlloc
VirtualFree
VirtualProtect
GetCurrentProcessId
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
RtlUnwind
GetCurrentThreadId
GetCommandLineA
HeapDestroy
HeapCreate
ExitProcess
TerminateProcess
GetCurrentProcess
RaiseException
InterlockedExchange
VirtualQuery
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
CompareStringA
GetCPInfo
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
SetStdHandle
QueryPerformanceCounter
GetTickCount
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
CoreDeleteInstance
CoreGet
CoreInit
CoreInit2
CoreInit3
CoreInit4
CoreInit5
CoreInitEx
CoreNewInstance
CoreSet
CoreUninit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ