Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2e83f6f1963eb91ce232ba84108f0dd7046fc4f7577fad2d45e8099a4bf24623.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2e83f6f1963eb91ce232ba84108f0dd7046fc4f7577fad2d45e8099a4bf24623.dll
Resource
win10v2004-20240611-en
Target
2e83f6f1963eb91ce232ba84108f0dd7046fc4f7577fad2d45e8099a4bf24623
Size
920KB
MD5
2824d088db181ed06f6a6f02c007d7a7
SHA1
7b30d0d0265a183670db23ab232fca78c109ed99
SHA256
2e83f6f1963eb91ce232ba84108f0dd7046fc4f7577fad2d45e8099a4bf24623
SHA512
33a7da99c834dfeb96cf73fc6311e443cca065e8b2aea0c43d9342ced31b02b7edecd6cbd4a2a2699f93225438f7cc02314f157cb0da70497ce2fbbfd31644e6
SSDEEP
12288:2x4GLhxRqbkYphHTklHPJbp8iyq7koM82fBlSt:2x4GfRFYvklHPJbuiyq7krr4
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetCurrentProcessId
CreateDirectoryW
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
GetExitCodeProcess
GetLastError
WaitForSingleObject
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DecodePointer
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleW
GlobalLock
GlobalUnlock
lstrcpynW
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
GetCurrentThreadId
CreateFileW
GetTempPathW
CloseHandle
FindClose
ReadFile
WriteFile
WritePrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
lstrlenW
GetProcAddress
GetPrivateProfileStringW
GetCurrentProcess
FreeLibrary
GetVersionExW
LoadLibraryW
Sleep
GetFileType
GetStdHandle
GetACP
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
LoadLibraryExW
InterlockedFlushSList
RtlUnwindEx
RtlPcToFileHeader
OutputDebugStringW
InitializeSListHead
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetStringTypeW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
EncodePointer
SetLastError
wsprintfW
LoadStringW
LoadBitmapW
InsertMenuItemW
SetMenuItemBitmaps
InsertMenuW
CreatePopupMenu
DeleteObject
LookupAccountSidW
DuplicateTokenEx
CreateProcessAsUserW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetTokenInformation
GetTokenInformation
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegDeleteValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
SHGetFolderPathW
DragQueryFileW
SHGetSpecialFolderPathW
SHChangeNotify
ReleaseStgMedium
IIDFromString
StrStrIW
SHSetValueW
SHGetValueW
SHDeleteValueW
SHDeleteKeyW
PathFileExistsW
PathAppendW
PathFindExtensionW
PathIsDirectoryW
PathRemoveFileSpecW
DestroyEnvironmentBlock
CreateEnvironmentBlock
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ