Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
06d7651dcfe5199304349eeb756aa078113b3604d62026c3a599c61e25ee0542.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
06d7651dcfe5199304349eeb756aa078113b3604d62026c3a599c61e25ee0542.dll
Resource
win10v2004-20240508-en
Target
06d7651dcfe5199304349eeb756aa078113b3604d62026c3a599c61e25ee0542
Size
602KB
MD5
5ff83ac615a3f5c8a255f2ad6f7266bd
SHA1
9d12d09a69a5fa63bd6e1f79d8899a1bb5147268
SHA256
06d7651dcfe5199304349eeb756aa078113b3604d62026c3a599c61e25ee0542
SHA512
374e4ad15c660b6a5c42192ae0164d01fcbd2092f495f7d2e792d9b3b9785b83b522b678122e18cd5bbe36dcea4180ef094df3054f133180850e4dbe81076fc8
SSDEEP
12288:rm1vdM1biLOGGXNxxnAQoDccuvuJsLeNURCInXzhzZ2qTh3EzdElpuJ9KMXo+r8:reKcc3vuJsLeNUznhQdOR
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\a\_work\1\b\Mixed Platforms\Release\HookLogger.pdb
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetLastError
DeleteCriticalSection
DecodePointer
CreateFileW
CloseHandle
Sleep
GetLocalTime
GetCurrentThreadId
WriteFile
FlushFileBuffers
OutputDebugStringA
OpenProcess
RaiseException
GetSystemTimeAsFileTime
QueryFullProcessImageNameW
GetProcessHeap
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
MultiByteToWideChar
InitializeCriticalSectionEx
SetStdHandle
GetConsoleCP
GetConsoleMode
GetProcessTimes
SwitchToThread
FindFirstFileExA
GetTimeZoneInformation
SetConsoleCtrlHandler
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetFileType
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
FormatMessageA
WideCharToMultiByte
GetStringTypeW
LocalFree
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
GetFullPathNameW
SetEndOfFile
SetFileAttributesW
SetFileInformationByHandle
SetFilePointerEx
SetFileTime
GetTempPathW
AreFileApisANSI
DeviceIoControl
CreateDirectoryExW
CopyFileW
MoveFileExW
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObjectEx
WriteConsoleW
GetExitCodeThread
GetNativeSystemInfo
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
GetModuleHandleW
GetProcAddress
EncodePointer
LCMapStringEx
GetLocaleInfoEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
OutputDebugStringW
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
ResumeThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
GetModuleFileNameW
HeapFree
GetCurrentThread
HeapSize
HeapReAlloc
HeapAlloc
GetACP
GetStdHandle
GetForegroundWindow
GetWindowThreadProcessId
GetWindowTextW
GetWindowTextLengthW
GetClassNameW
GetParent
GetWindowLongW
UnregisterClassW
RegOpenKeyExW
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RegCloseKey
RegQueryValueExW
SHCreateDirectoryExW
SHGetFolderPathW
SafeArrayLock
SafeArrayCreate
SafeArrayDestroy
SafeArrayUnlock
SafeArrayGetLBound
SafeArrayGetUBound
SysAllocString
SysFreeString
UAVRGetNextMessage
UAVRGetProcessInfo
UAVRInstallHook
UAVRSetLogLevel
UAVRSetLogPath
UAVRUninstallHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ