Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b63625340eead682c10fbf1d2d5e7700fa143d7b9d46ddc5adb442dad37316fb.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
b63625340eead682c10fbf1d2d5e7700fa143d7b9d46ddc5adb442dad37316fb.dll
Resource
win10v2004-20240611-en
Target
b63625340eead682c10fbf1d2d5e7700fa143d7b9d46ddc5adb442dad37316fb
Size
926KB
MD5
025dcdeb5c73dc903529491adde32a04
SHA1
539ca3b983b7bd4e516d5d20babb6ea4871efdab
SHA256
b63625340eead682c10fbf1d2d5e7700fa143d7b9d46ddc5adb442dad37316fb
SHA512
97911cc005087158216db386d5a97ca5b623a03734c063a34b6f2c37278510ccb8135b5d7de0b9d929bf156fff9752d770b0e39e3770024f2d3f9f956e0aa5bf
SSDEEP
12288:nbOTweGSaL21t3/S23NaVf6rmIefdkdwzNykvph0lhSMXl+FpTu/fGsnxpqjq+:nCTwNSJt30nIeamykhh0lhSMXlqWh67
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
C:\BUILD\work\e0dd96435fde7cb0\COMPILEIDP\Release_Unicode-x64-gqcavrq\bin\Release_Unicode_vs143\x64\aswcomm.pdb
LdrLoadDll
RtlDosPathNameToNtPathName_U
LdrUnloadDll
LdrGetProcedureAddress
RtlGetFullPathName_U
ZwFsControlFile
RtlGetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
RtlSetGroupSecurityDescriptor
RtlEqualSid
ZwOpenFile
RtlCreateAcl
RtlAddAccessDeniedAceEx
RtlCopySid
RtlValidSecurityDescriptor
RtlGetGroupSecurityDescriptor
RtlLengthSid
ZwOpenThreadToken
RtlGetOwnerSecurityDescriptor
RtlAddAccessAllowedAceEx
RtlFreeUnicodeString
RtlGetAce
RtlGetSaclSecurityDescriptor
RtlSetDaclSecurityDescriptor
RtlSetOwnerSecurityDescriptor
RtlSetSaclSecurityDescriptor
ZwQueryVirtualMemory
ZwOpenProcessToken
ZwQueryInformationToken
RtlGetCurrentDirectory_U
RtlGetNativeSystemInformation
RtlInitUnicodeString
RtlCreateUnicodeString
RtlFreeHeap
RtlAllocateHeap
ZwQuerySystemInformation
RtlTimeFieldsToTime
ZwResetEvent
ZwSetEvent
ZwCreateEvent
RtlLeaveCriticalSection
RtlInitializeCriticalSection
RtlEnterCriticalSection
RtlDeleteCriticalSection
ZwResumeThread
ZwClose
ZwDelayExecution
ZwTerminateProcess
RtlCreateUserThread
ZwSetInformationThread
ZwQueryInformationThread
CsrClientCallServer
ZwReadFile
ZwWriteFile
ZwSetInformationFile
ZwFlushBuffersFile
ZwReleaseMutant
ZwCreateNamedPipeFile
ZwCancelIoFile
RtlExitUserThread
ZwTerminateThread
ZwWaitForSingleObject
RtlxOemStringToUnicodeSize
RtlOemStringToUnicodeString
NlsMbOemCodePageTag
RtlNtStatusToDosError
RtlxAnsiStringToUnicodeSize
NlsMbCodePageTag
RtlAnsiStringToUnicodeString
LdrGetDllHandle
RtlReAllocateHeap
RtlTimeToTimeFields
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
GetProcAddress
FreeLibrary
CloseHandle
GetLastError
CompareStringW
ExpandEnvironmentStringsW
GetModuleFileNameW
GetShortPathNameW
GetFileAttributesW
GetSystemWindowsDirectoryW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
InitializeSListHead
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetCurrentProcess
TerminateProcess
CreateFileW
DeviceIoControl
GetProcessAffinityMask
GetLongPathNameW
VirtualAlloc
VirtualFree
GlobalMemoryStatusEx
LocalFree
HeapAlloc
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
HeapFree
EnterCriticalSection
LeaveCriticalSection
GetSystemInfo
GetVersionExW
RaiseException
WideCharToMultiByte
DisableThreadLibraryCalls
SetLastError
GetTickCount
OutputDebugStringW
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
SetEnvironmentVariableW
InitializeCriticalSection
WaitForMultipleObjectsEx
GetEnvironmentVariableW
GetCurrentDirectoryW
CreateDirectoryW
GetFullPathNameW
GetFileInformationByHandle
GetWindowsDirectoryW
SetFilePointer
ReadFile
?_Getcvt@_Locinfo@std@@QEBA?AU_Cvtvec@@XZ
?_Xlength_error@std@@YAXPEBD@Z
?__ExceptionPtrDestroy@@YAXPEAX@Z
?__ExceptionPtrCopy@@YAXPEAXPEBX@Z
?__ExceptionPtrCurrentException@@YAXPEAX@Z
?__ExceptionPtrCreate@@YAXPEAX@Z
?_Xout_of_range@std@@YAXPEBD@Z
?_Xbad_function_call@std@@YAXXZ
?_Xbad_alloc@std@@YAXXZ
_Mbrtowc
?_Incref@facet@locale@std@@UEAAXXZ
??1_Locinfo@std@@QEAA@XZ
??1_Lockit@std@@QEAA@XZ
??0_Locinfo@std@@QEAA@PEBD@Z
??0_Lockit@std@@QEAA@H@Z
?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z
?_Gettrue@_Locinfo@std@@QEBAPEBDXZ
?_Getfalse@_Locinfo@std@@QEBAPEBDXZ
??Bid@locale@std@@QEAA_KXZ
?id@?$numpunct@_W@std@@2V0locale@2@A
?_Getlconv@_Locinfo@std@@QEBAPEBUlconv@@XZ
?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ
??1facet@locale@std@@MEAA@XZ
??0facet@locale@std@@IEAA@_K@Z
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
__CxxFrameHandler4
memcpy
memmove
__current_exception
__current_exception_context
memset
__std_exception_copy
_set_se_translator
__std_type_info_destroy_list
__std_exception_destroy
wcsstr
wcschr
__std_terminate
__C_specific_handler
memcmp
_CxxThrowException
wcsrchr
_purecall
_callnewh
malloc
free
calloc
_initterm_e
terminate
_cexit
_crt_atexit
_execute_onexit_table
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
_invalid_parameter_noinfo_noreturn
_initterm
_free_locale
_create_locale
setlocale
__stdio_common_vsprintf
__stdio_common_vswprintf
wcsncpy
_wcsicmp
_wcsnicmp
wcsncmp
srand
_wcstoui64
_fdsign
_ldsign
_dsign
_ldclass
_dclass
_fdclass
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
FreeSid
GetSidSubAuthorityCount
GetSidSubAuthority
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetLengthSid
InitializeAcl
AddAce
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExW
GetAvgObject
GetAvgObject2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ