Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
c9037e83c90e85a846957b373d03b5cd0a5a773d2c706bc9862c30d8ece4bb30.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c9037e83c90e85a846957b373d03b5cd0a5a773d2c706bc9862c30d8ece4bb30.dll
Resource
win10v2004-20240709-en
Target
c9037e83c90e85a846957b373d03b5cd0a5a773d2c706bc9862c30d8ece4bb30
Size
229KB
MD5
9a56ed924ddb69fc96ea76a6dd3e373d
SHA1
43a7fcba6c3c355ba6a763a6c0a512b8e490e09c
SHA256
c9037e83c90e85a846957b373d03b5cd0a5a773d2c706bc9862c30d8ece4bb30
SHA512
b43b6b6bf76df395a510dba93570dbaadfb2c61e6bb88badfa3db23b325af79a3676cbbfe95b9c70cf5fbfacaf03493d2f980312cf9026320fb1487902d90622
SSDEEP
3072:CZM3Fhf8M+MOQhfWfm14tpicChmS4urGjqqDFvuQthmPihOsXvwKZw0Umpsiluyq:C2VhdJ14LBCAS4m4FGqNpUmDu3
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
C:\ws2\workspace\j_WVV137NU\Bin\win_x86\exe\ah64.pdb
GetUserNameExW
InitializeCriticalSectionAndSpinCount
CreateFileW
GetLastError
OutputDebugStringW
GetCurrentThread
CloseHandle
RaiseException
GetProcAddress
DeleteCriticalSection
GetCurrentProcessId
GetModuleHandleW
GetTickCount
GetCurrentProcess
Sleep
DisableThreadLibraryCalls
CreateThread
HeapFree
OutputDebugStringA
GetProcessId
HeapSize
HeapReAlloc
HeapAlloc
HeapDestroy
GetProcessHeap
VirtualQueryEx
SizeofResource
QueryDosDeviceW
GetModuleFileNameW
OpenProcess
GetLogicalDriveStringsW
LockResource
LoadLibraryW
FindResourceExW
LoadResource
FindResourceW
FreeLibrary
IsBadReadPtr
VirtualQuery
GetCurrentThreadId
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualProtect
VirtualFree
VirtualProtectEx
LoadLibraryExW
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
SetFilePointerEx
GetConsoleMode
WriteFile
SetLastError
WriteConsoleW
FlushFileBuffers
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
EncodePointer
RtlUnwindEx
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetACP
GetStdHandle
GetFileType
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
SetStdHandle
GetConsoleCP
RegOpenKeyExW
RegCloseKey
GetUserNameW
RegQueryValueExW
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ