Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
9aacffe08f5bf96a8e96214021094a80N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9aacffe08f5bf96a8e96214021094a80N.dll
Resource
win10v2004-20240802-en
Target
9aacffe08f5bf96a8e96214021094a80N
Size
1.5MB
MD5
9aacffe08f5bf96a8e96214021094a80
SHA1
65d2569e8dafc1cf990c8c2d4605078980630847
SHA256
9019cb133061aa1cbc767b73f22d01bae3d2241978557cea4889fc484e9719f0
SHA512
a40219316089558b3d8c38c4ec3220e593818df0feef9ef505662baf818bd6f2c16d081f8b40c10142e22e500d4cf8b63a58b386cb3f23b321eda12af911df07
SSDEEP
6144:YFjeFW6wiDwJ8pFAhp7Lyf/8c/28AH7O8zu/Ab2:YFj36NpFAXW8cOs
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleW
LoadLibraryA
GetProcAddress
GetLastError
FreeLibrary
LocalAlloc
RaiseException
LoadLibraryExW
GetSystemDirectoryW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualProtect
IsBadWritePtr
FormatMessageW
GetTickCount
CreateThread
CloseHandle
HeapDestroy
lstrlenA
OutputDebugStringA
GetModuleFileNameW
SetLastError
lstrlenW
InitializeCriticalSection
DeleteCriticalSection
GetCurrentThreadId
MultiByteToWideChar
GetModuleHandleA
LoadLibraryW
GetFileAttributesW
GetVersion
LeaveCriticalSection
EnterCriticalSection
FlushInstructionCache
GetCurrentProcess
WriteFileEx
GetConsoleAliasesLengthW
EnumLanguageGroupLocalesW
RtlFillMemory
GetOverlappedResult
EnumCalendarInfoExW
WritePrivateProfileStructA
GetTempFileNameA
GetLocalTime
GetDevicePowerState
SetupComm
GetSystemWindowsDirectoryA
GetSystemInfo
GetProcessHeaps
UnregisterWaitEx
GetLongPathNameA
SetNamedPipeHandleState
GlobalAlloc
SetCommMask
GetBinaryTypeW
WaitForSingleObject
ReleaseMutex
EnumSystemCodePagesA
ContinueDebugEvent
Heap32ListNext
EnumDateFormatsW
SetStdHandle
GetTimeFormatW
GetThreadContext
TerminateThread
ExitProcess
MoveFileWithProgressA
CreateWaitableTimerA
SetComputerNameA
DeleteVolumeMountPointW
SetConsoleCursor
FillConsoleOutputCharacterW
GetProcessAffinityMask
BackupWrite
CompareStringW
LoadCursorA
LoadIconA
EnumClipboardFormats
GetSystemMetrics
SendMessageW
SetWindowPos
GetDlgCtrlID
RegisterClassExA
GetClassInfoExA
CreateWindowExW
GetMessagePos
wsprintfA
SetCursor
DefWindowProcA
CallWindowProcA
DestroyWindow
GetNextDlgTabItem
GetDlgItem
ShowWindow
CreateDialogParamW
DialogBoxParamW
LoadImageA
TranslateMessage
GetMessageA
PeekMessageA
EnableWindow
CheckRadioButton
IsDialogMessageA
PostQuitMessage
IsWindow
GetActiveWindow
LoadStringW
MessageBoxW
PostMessageA
SendDlgItemMessageA
SetDlgItemTextW
SendMessageA
IsDlgButtonChecked
CheckDlgButton
GetWindowLongA
SetWindowLongA
EndDialog
GetParent
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
DispatchMessageA
MapWindowPoints
ScreenToClient
CharToOemW
DrawStateW
SetWindowWord
MessageBoxIndirectA
SwitchToThisWindow
RealizePalette
GetCharABCWidthsI
ExtCreateRegion
GetTextExtentExPointA
StartPage
GetUserNameA
RegOpenKeyA
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegQueryValueExA
RegSetValueExA
RegCloseKey
DuplicateIcon
DoEnvironmentSubstA
CommandLineToArgvW
SHFileOperationA
SHGetFolderLocation
DragAcceptFiles
SHLoadNonloadedIconOverlayIdentifiers
SHFreeNameMappings
ShellAboutA
ShellExecuteA
ExtractIconW
DragQueryFile
FindExecutableA
SHGetPathFromIDListA
SHEmptyRecycleBinW
StrRChrA
StrChrW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ