Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8ec26387ca963b72870e2c6275a933f0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8ec26387ca963b72870e2c6275a933f0N.dll
Resource
win10v2004-20240802-en
Target
8ec26387ca963b72870e2c6275a933f0N.exe
Size
1.1MB
MD5
8ec26387ca963b72870e2c6275a933f0
SHA1
a6716777b3fd7adaf346ccb10125ddba3d67e3f1
SHA256
489e509b0e74d578bf2e1314a81a659d846030a1c20e9d1b7ac233a5db2faedc
SHA512
a3a9fb41b53d5de0a354adc6b0d83c5874aed2775464561cdd6ce9e3aa793a15c069316ce17114129c8ca16051fc2526098c30771f3337347066589ab852f3fc
SSDEEP
24576:u3XuyoSUvGTYNZMvOdlYx1mTJ5eISZbTrT9BCRLp:u3xTYNZMClE1m6xZbT3Q
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
WriteFile
ReadFile
GetCurrentDirectoryA
LocalFree
FlushFileBuffers
GetDriveTypeA
SetEndOfFile
FindFirstFileA
FindClose
FindNextFileA
SetLocalTime
HeapFree
HeapAlloc
GetCurrentThreadId
FlsSetValue
GetCommandLineA
GetProcessHeap
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
HeapSetInformation
HeapCreate
HeapDestroy
ExitProcess
GetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
TlsFree
FlsFree
TlsSetValue
FlsAlloc
LCMapStringA
WideCharToMultiByte
LCMapStringW
RtlUnwindEx
DeleteCriticalSection
SetFilePointer
EnterCriticalSection
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
SetConsoleCtrlHandler
InitializeCriticalSection
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetVolumeInformationA
GetWindowsDirectoryA
CreateProcessA
WaitForSingleObject
CreateFileW
SetConsoleMode
ReadConsoleInputA
FlushConsoleInputBuffer
LoadLibraryW
GetVersion
GetModuleHandleW
GetVersionExA
GlobalReAlloc
GetFileInformationByHandle
Sleep
GetModuleHandleA
GetModuleFileNameA
GetSystemDirectoryA
GlobalLock
GlobalUnlock
GetSystemTime
GetLocalTime
MultiByteToWideChar
GetComputerNameA
SetLastError
GetLastError
GetCurrentThread
GetCurrentProcess
GetSystemInfo
GlobalFree
GlobalAlloc
FreeLibrary
GlobalMemoryStatus
LoadLibraryA
GetProcAddress
DeviceIoControl
CreateFileA
CloseHandle
GetFileTime
SetFileAttributesA
FileTimeToSystemTime
GetFileAttributesA
SetFileTime
SystemTimeToFileTime
LeaveCriticalSection
DeleteFileA
SetWindowTextA
GetDC
LoadImageA
UpdateWindow
CallWindowProcA
DialogBoxIndirectParamA
GetWindowTextA
CheckRadioButton
CreateIcon
SetCursor
LoadCursorA
SetWindowLongA
MessageBoxA
GetWindowRect
InvalidateRect
GetDlgItemTextA
SetWindowLongPtrA
wsprintfA
IsDlgButtonChecked
SendMessageA
ShowWindow
DispatchMessageA
PeekMessageA
TranslateMessage
SetDlgItemTextA
GetWindowLongA
CreateWindowExA
GetDlgItem
GetFocus
EndDialog
DestroyCursor
GetDesktopWindow
GetSysColor
SetWindowPos
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxW
GetDeviceCaps
CreateFontA
DeleteDC
SetTextColor
CreateCompatibleBitmap
CreateSolidBrush
GetStockObject
CreateCompatibleDC
SelectObject
DeleteObject
SetBkMode
SetPixel
RegisterEventSourceW
DeregisterEventSource
AllocateAndInitializeSid
FreeSid
RegDeleteValueA
RegSetValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetSidSubAuthorityCount
LookupAccountNameA
GetTokenInformation
IsValidSid
GetSidIdentifierAuthority
OpenProcessToken
GetSidSubAuthority
OpenThreadToken
ReportEventW
ShellExecuteA
CoUninitialize
CoSetProxyBlanket
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
VariantClear
SysStringLen
SysFreeString
SysAllocString
pp_adddays
pp_bitclear
pp_bitset
pp_bittest
pp_cenum
pp_checksum
pp_chkvarchar
pp_chkvardate
pp_chkvarnum
pp_compno
pp_compnoinit
pp_copyadd
pp_copycheck
pp_copycheckth
pp_copydelete
pp_copyget
pp_countdec
pp_countinc
pp_daysleft
pp_decrypt
pp_encrypt
pp_errorstr
pp_expired
pp_exportactfile
pp_eztrial1
pp_eztrial1ex
pp_eztrial1test
pp_eztrial2
pp_eztrig1
pp_eztrig1dlg
pp_eztrig1ex
pp_filedelete
pp_getcompno
pp_getcompnoxml
pp_getdate
pp_getdateex
pp_gettime
pp_gettimeex
pp_getvarchar
pp_getvardate
pp_getvarnum
pp_gotourl
pp_hdserial
pp_importactfile
pp_lanactive
pp_lancheck
pp_lastday
pp_lfalias
pp_lfclose
pp_lfcopy
pp_lfcreate
pp_lfdelete
pp_lflock
pp_lfopen
pp_lfpermset
pp_lfunlock
pp_libtest
pp_libversion
pp_ndecrypt
pp_ndecryptx
pp_nencrypt
pp_nencryptx
pp_npdate
pp_password
pp_redir
pp_semclose
pp_semcount
pp_semopen
pp_semtest
pp_semused
pp_setvarchar
pp_setvardate
pp_setvarnum
pp_sysinfo
pp_tcode
pp_timercheck
pp_timerstart
pp_transfer
pp_upddate
pp_valdate
pp_wmigetdata
sample_of_custom_function
test
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ