Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
589cb45aaa6fc5a30c5aa4eaff17edc0N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
589cb45aaa6fc5a30c5aa4eaff17edc0N.dll
Resource
win10v2004-20240802-en
Target
589cb45aaa6fc5a30c5aa4eaff17edc0N.exe
Size
369KB
MD5
589cb45aaa6fc5a30c5aa4eaff17edc0
SHA1
f094502378af109bba8bcdcd6d821726955babdd
SHA256
f3849f9a3e98d11158041b36762016b9f38d19f52825d7bb00851de7eca9bb37
SHA512
f40caedfa85588c96d459627b677130c4d3d8c511ee910a5d1788b1243f1b5bfa3c0d9076508c07780d73fbab046826fc641dace9e7db301ae1ff50ff56a5851
SSDEEP
3072:2+XKJbZ0S7hQhwkn2NZ/ZhKZZITFwrRddLtub/HXDNHTNA71o2JQ:2+XKJbt7hQGlzRuITmRddLtubxzCJQ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
C:\Users\build\unfuddle\endpoint\trunk\windows\app_hook\x64\Release\si64_user.pdb
ntohs
getsockopt
getsockname
getpeername
WSASetLastError
ntohl
GetProcessImageFileNameW
FilterConnectCommunicationPort
FilterSendMessage
SetFilePointerEx
CreateFileW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapDestroy
SetStdHandle
WriteConsoleW
RtlPcToFileHeader
GetModuleHandleW
GetProcAddress
GetStdHandle
SetLastError
ExitThread
GetModuleFileNameW
GetModuleHandleExW
GetCommandLineW
CloseHandle
GetLastError
OpenProcess
Sleep
GetCurrentProcessId
CreateThread
SetThreadPriority
GetLongPathNameW
VirtualQuery
GetThreadContext
GetCurrentProcess
GetCurrentThread
VirtualFree
InitializeCriticalSection
LeaveCriticalSection
FlushInstructionCache
VirtualAlloc
EnterCriticalSection
VirtualProtectEx
OpenThread
GetSystemInfo
GetThreadPriority
GetCurrentThreadId
SuspendThread
ResumeThread
HeapReAlloc
HeapSize
LoadLibraryW
OutputDebugStringW
RtlUnwindEx
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
ExitProcess
MultiByteToWideChar
RaiseException
GetCommandLineA
HeapFree
HeapAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
TerminateProcess
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WriteFile
LoadLibraryExW
WideCharToMultiByte
GetStringTypeW
GetProcessHeap
GetFileType
InitOnceExecuteOnce
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount64
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringEx
wsprintfW
?si_user_get_policy@@YAIXZ
?si_user_send_msg@@YA?AW4_SI_ERR@@PEAU_LOC_MSG_HEADER@@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ