Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
135fb18b0dab6c5a94dc53b7bb8af270N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
135fb18b0dab6c5a94dc53b7bb8af270N.dll
Resource
win10v2004-20240709-en
Target
135fb18b0dab6c5a94dc53b7bb8af270N.exe
Size
384KB
MD5
135fb18b0dab6c5a94dc53b7bb8af270
SHA1
33e8fcfef0a4fe8f7b9d81312e25b95e44cd628e
SHA256
9735e6d9a9d7e5f5074657b1601097fbe5f0624ba07ca0418312d7ae547714f5
SHA512
df445f21e87c50dbcc522abf04f2d6fbb482377b4f34dbd7d5af7c6f140e3c0ab295dc7857c7cea5f0f4f305c32ad2b66d5062f7a18e932bcc434c7693e968ef
SSDEEP
6144:bxnTCD71NRgwElyX6yenLiIpzzYeFEYhRoLGNnX1vppyYCsdew1Tpd:FTqNRgllyX6yenLiAfY0NhRoLGN4YFRn
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\src\debug\src\build\Release\gcapi_dll.dll.pdb
timeGetTime
lstrlenW
IsDebuggerPresent
RaiseException
GetCurrentThreadId
Sleep
GetCurrentProcess
InterlockedExchangeAdd
InterlockedCompareExchange
GetProcAddress
GetModuleHandleW
GetNativeSystemInfo
GetVersionExW
QueryPerformanceCounter
GetSystemTimeAsFileTime
SystemTimeToFileTime
TzSpecificLocalTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExpandEnvironmentStringsW
OpenProcess
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
InterlockedIncrement
WideCharToMultiByte
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
InitializeCriticalSection
EncodePointer
DecodePointer
GetCommandLineA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
GetConsoleCP
GetConsoleMode
HeapFree
ExitProcess
HeapReAlloc
HeapAlloc
LCMapStringW
GetCPInfo
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
GetTimeZoneInformation
WriteConsoleW
SetStdHandle
IsProcessorFeaturePresent
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
FreeLibrary
LoadLibraryW
GetLocaleInfoW
GetStringTypeW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
LeaveCriticalSection
CompareStringW
SetEnvironmentVariableA
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetCommandLineW
LocalFree
GetModuleHandleA
FormatMessageA
OutputDebugStringA
WriteFile
CreateFileW
SetFilePointer
CreateMutexW
GetModuleFileNameW
GetDriveTypeW
GetProcessHeap
GetFullPathNameW
LocalAlloc
LoadLibraryA
CreateProcessW
DeleteFileW
SetLastError
GetLastError
CloseHandle
ReleaseMutex
WaitForSingleObject
GetTickCount
GetCurrentProcessId
GetLocalTime
SizeofResource
LockResource
LoadResource
FindResourceW
ResumeThread
AssignProcessToJobObject
ReadFile
GetFileAttributesW
GetTempPathW
GetCurrentDirectoryW
SetEnvironmentVariableW
GetEnvironmentVariableW
GetUserDefaultUILanguage
GetSystemDirectoryW
GetWindowsDirectoryW
SetEndOfFile
IsValidLocale
RegDeleteKeyW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RevertToSelf
ImpersonateLoggedOnUser
DuplicateTokenEx
CreateProcessAsUserW
OpenProcessToken
GetTokenInformation
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
ConvertSidToStringSidW
CharUpperW
MessageBoxW
SetWindowPos
GetClassNameW
GetWindowThreadProcessId
GetShellWindow
EnumWindows
DestroyEnvironmentBlock
CreateEnvironmentBlock
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
CoUninitialize
CoCreateInstance
CoInitializeSecurity
CoSetProxyBlanket
CoTaskMemFree
CoInitializeEx
SysAllocString
SysFreeString
VariantClear
CanOfferReactivation
CanOfferRelaunch
GoogleChromeCompatibilityCheck
GoogleChromeDaysSinceLastRun
LaunchGoogleChrome
LaunchGoogleChromeInBackground
LaunchGoogleChromeWithDimensions
ReactivateChrome
SetRelaunchOffered
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ