Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
09e451aa6b66882e2f79d403b6b47870N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
09e451aa6b66882e2f79d403b6b47870N.dll
Resource
win10v2004-20240802-en
Target
09e451aa6b66882e2f79d403b6b47870N.exe
Size
127KB
MD5
09e451aa6b66882e2f79d403b6b47870
SHA1
02c7c00ccc743596f4df20486a18b1d536edb3d5
SHA256
44dbaf87e174fc5ce52750bb458cfb43f605a8e6814b5463be7d8e16d61480ad
SHA512
98684f134513cb330231e7df93443bcf6d427b1e0de4340830349a91aaf288f2b87984b48f24dd4acb81a12542276acd2e84dbdf5777fd4020b3ab3d13c9ff8d
SSDEEP
3072:smmeaaFuh34fSpz3EWROlNPoVx+gL7zf38QB1QNPH:sxTHho63ELlNPUx+Uf89PH
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
WriteProcessMemory
VirtualAllocEx
CreateToolhelp32Snapshot
Process32NextW
OpenProcess
Process32FirstW
GetCurrentProcessId
GetCurrentThread
GetLastError
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetModuleHandleW
VirtualProtectEx
CreateRemoteThread
LeaveCriticalSection
TerminateProcess
DeleteCriticalSection
Sleep
GetModuleFileNameW
DeleteFileW
lstrlenW
CreateThread
CreateProcessW
lstrlenA
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
GetModuleFileNameA
SetEndOfFile
WriteConsoleW
LoadLibraryW
CreateFileA
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
WaitForSingleObject
CloseHandle
EnterCriticalSection
VirtualFreeEx
WriteFile
GetTickCount
QueryPerformanceCounter
HeapCreate
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
VirtualQuery
InterlockedCompareExchange
GetCurrentThreadId
VirtualProtect
ResumeThread
FlushInstructionCache
GetCurrentProcess
SetThreadContext
GetThreadContext
VirtualFree
SuspendThread
VirtualAlloc
ReadProcessMemory
SetLastError
VirtualQueryEx
CreateProcessA
RaiseException
InitializeCriticalSectionAndSpinCount
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RtlUnwind
GetSystemTimeAsFileTime
DecodePointer
GetCommandLineA
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
LCMapStringW
ReadFile
SetFilePointer
ExitProcess
SetHandleCount
GetStdHandle
CreateFileW
EnumChildWindows
EnumWindows
GetWindowRect
IsWindowVisible
GetParent
GetWindowThreadProcessId
SendMessageW
FindWindowW
MessageBoxW
PostMessageW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
ShellExecuteW
CoInitialize
CoUninitialize
PathIsDirectoryW
PathFileExistsW
URLDownloadToFileW
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
EnableDocJSexec
EnableMute
IsMuteEnabled
commauth
commauth2
getgamewnd2
openinstruc
openinstruc2
qqonline
qqonline2
verifyid
verifyid2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ