Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
69097f7b1790674ea5e04ba863adc910N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
69097f7b1790674ea5e04ba863adc910N.dll
Resource
win10v2004-20240802-en
Target
69097f7b1790674ea5e04ba863adc910N.exe
Size
93KB
MD5
69097f7b1790674ea5e04ba863adc910
SHA1
43f11546e4d8cf9c64bf1eba04d74c35835a4689
SHA256
187610d1bbd3e978be871d18692dac876e879c49b1abe9775ba70fdfce643c1b
SHA512
135f7dc32bd38c61ffe717e588102bf7646fac8c24db486d201232a5a0f8edc00e80166342a0a1a641e089c2a084844671791e9301c6329ed5fc905fe2363f2c
SSDEEP
1536:kM/MndxPBA3W11Tu1b4SjJcujDuQ7bqKT:PYf23W1ub4sJcujDLbh
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
socket
htons
inet_addr
connect
getsockname
sendto
closesocket
ord4
GetRoleTextA
GetStateTextA
AccessibleObjectFromWindow
AccessibleObjectFromEvent
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
GetModuleFileNameExA
ord823
ord1182
ord1168
ord3663
ord2864
ord800
ord861
ord342
ord1253
ord825
ord540
strncmp
strchr
_ismbslead
_beginthread
clock
__CxxFrameHandler
wcsstr
?terminate@@YAXXZ
_onexit
free
_initterm
malloc
_adjust_fdiv
strstr
_stricmp
strncpy
_vsnprintf
_except_handler3
__dllonexit
sprintf
strrchr
lstrlenA
GetLastError
InitializeCriticalSection
GetCurrentProcessId
DeleteCriticalSection
TerminateThread
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
VirtualFreeEx
SetEvent
GetProcAddress
MultiByteToWideChar
Sleep
WaitForSingleObject
OutputDebugStringA
EnterCriticalSection
LeaveCriticalSection
OpenProcess
VirtualQueryEx
VirtualProtectEx
CreateEventA
GetModuleHandleA
CloseHandle
WideCharToMultiByte
GetCurrentProcess
GetWindowTextW
GetClassNameA
SetWinEventHook
SetWindowsHookExA
GetWindowThreadProcessId
FindWindowExA
UnhookWinEvent
UnhookWindowsHookEx
CallNextHookEx
GetParent
GetActiveWindow
SystemParametersInfoA
GetWindowTextA
wsprintfA
SendMessageA
FindWindowA
GetWindowInfo
IsWindow
GetCapture
GetWindowLongA
GetWindowRect
EnumChildWindows
IsWindowVisible
VariantClear
VariantInit
SysFreeString
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0CMousehook@@QAE@XZ
??1CMousehook@@UAE@XZ
??_7CMousehook@@6B@
?SetWorkParam@CMousehook@@QAEXHPADFH@Z
?ShowRandStr@CMousehook@@QAEXXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ