Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
96ddd901953f0d08ba9fc61abe78e088498d52de071202b176330b8cefc3ffb6.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
96ddd901953f0d08ba9fc61abe78e088498d52de071202b176330b8cefc3ffb6.dll
Resource
win10v2004-20240611-en
Target
96ddd901953f0d08ba9fc61abe78e088498d52de071202b176330b8cefc3ffb6
Size
1.1MB
MD5
bf5a9a2842e3ea7371238ba3b7e9c111
SHA1
dda4436a05864f7b366936f24dc6ba29cc23be71
SHA256
96ddd901953f0d08ba9fc61abe78e088498d52de071202b176330b8cefc3ffb6
SHA512
0d3601af32cb3cf86c21444f39f8448de8e65f04ec79d2e47595c7c592e1d170f30788940cfaac0e779a613532be6440adce5987c4de880c4ef0fe5ed4ee5fa6
SSDEEP
24576:XvOU6aszcGFeMB8dxt1ByE2itpIssdFbB/69fwtXzaJBQplt/eppTSMQZHQW:d6aYcqB8kyrsd4fwtXzaJeplBefiZHQW
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
E:\Projects\LanAgent\LanAgentX\BuildOutput\x86\laSkype3.pdb
GetProcessMemoryInfo
SetFilePointer
ReadFile
WriteFile
ExpandEnvironmentStringsW
GetCurrentProcess
GetCurrentDirectoryW
GetCommandLineW
GetNativeSystemInfo
GetCurrentThread
HeapAlloc
GetProcessHeap
HeapFree
FindFirstFileW
FreeLibrary
LoadLibraryW
GetEnvironmentVariableA
GetStdHandle
GetProcAddress
FindClose
CreateMutexW
WaitForSingleObject
ReleaseMutex
OutputDebugStringW
FindNextFileW
Sleep
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
GetTimeZoneInformation
GetTempFileNameW
CopyFileW
GetFileInformationByHandle
FileTimeToSystemTime
GetFullPathNameW
GetFullPathNameA
HeapReAlloc
CreateFileA
GetFileSize
HeapCompact
TryEnterCriticalSection
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
QueryPerformanceCounter
InterlockedCompareExchange
UnlockFile
FlushViewOfFile
LockFile
WaitForSingleObjectEx
GetTickCount
UnlockFileEx
GetSystemTimeAsFileTime
FormatMessageA
FormatMessageW
GetVersionExW
HeapDestroy
GetFileAttributesA
HeapCreate
HeapValidate
GetFileAttributesW
FlushFileBuffers
GetTempPathW
HeapSize
LockFileEx
GetDiskFreeSpaceW
LoadLibraryA
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
GetSystemInfo
GetFileAttributesExW
GetCurrentThreadId
OutputDebugStringA
GetVersionExA
DeleteFileW
GetTempPathA
LocalFree
AreFileApisANSI
GetFileSizeEx
VirtualFree
VirtualAlloc
LocalAlloc
GetVersion
GetThreadLocale
GetStartupInfoA
GetLocaleInfoA
GetCommandLineA
ExitProcess
UnhandledExceptionFilter
RtlUnwind
RaiseException
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
lstrlenW
lstrlenA
lstrcpyW
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatW
GetDriveTypeW
WaitForMultipleObjects
VirtualQueryEx
VirtualQuery
VirtualProtectEx
VirtualProtect
TerminateThread
TerminateProcess
SetThreadPriority
SetLastError
ResumeThread
ReleaseSemaphore
ReadProcessMemory
OpenMutexW
OpenMutexA
OpenFileMappingW
OpenFileMappingA
OpenEventW
OpenEventA
LoadLibraryExA
GetWindowsDirectoryW
GetThreadContext
GetSystemDirectoryW
GetSystemDirectoryA
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetExitCodeThread
GetCurrentDirectoryA
InterlockedIncrement
InterlockedExchange
ExitThread
DuplicateHandle
DeviceIoControl
CreateThread
CreateSemaphoreA
CreateProcessA
CreatePipe
CreateMutexA
CreateEventA
InterlockedDecrement
GetStringTypeW
EncodePointer
DecodePointer
GetLocaleInfoW
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetEnvironmentStringsW
FreeEnvironmentStringsW
PeekNamedPipe
SetStdHandle
GetConsoleMode
GetConsoleCP
GetLastError
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetEvent
CloseHandle
CreateProcessW
CreateEventW
MoveFileW
GetLocalTime
SystemTimeToFileTime
GetSystemTime
GetCurrentProcessId
SetEnvironmentVariableA
DeleteFileA
WriteProcessMemory
IsValidCodePage
GetOEMCP
GetACP
GetStartupInfoW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
FileTimeToLocalFileTime
FindFirstFileExA
FindNextFileA
GetDriveTypeA
GetCPInfo
LCMapStringW
GetTimeFormatA
GetDateFormatA
CompareStringW
MessageBoxA
GetUserObjectInformationA
CloseDesktop
DispatchMessageA
GetThreadDesktop
GetSystemMetrics
MsgWaitForMultipleObjects
OpenInputDesktop
PeekMessageA
TranslateMessage
AdjustTokenPrivileges
AllocateAndInitializeSid
FreeSid
LookupPrivilegeValueA
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyW
RegOpenKeyExA
RegOpenKeyExW
RegSetValueExA
RegSetValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupAccountSidW
GetTokenInformation
OpenProcessToken
OpenThreadToken
GetKernelObjectSecurity
CoTaskMemFree
CoCreateInstance
SysAllocStringLen
SysReAllocStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ