Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
924e0985db435807fff8763c46b112590ac451faa357e40867cb137857c832d6.dll
Resource
win7-20240903-en
Target
924e0985db435807fff8763c46b112590ac451faa357e40867cb137857c832d6
Size
245KB
MD5
f32ac3227c05c6c70c6b255a4ca2664b
SHA1
9613ba4c8db40f88aaeba6fd42190405374f62b1
SHA256
924e0985db435807fff8763c46b112590ac451faa357e40867cb137857c832d6
SHA512
d7a03a337e3df8abdf46e6ad81c334f20adffb04760954c9d21b0cd619c66a4bfbd437802fee15d3a146b96f92536ff483ca46a4d62ec9e20d284eb526d83b6d
SSDEEP
6144:NQz/1/6kpLrRpb7qMeI4czBV+UdvrEFp7hKjTP:NMyqppb7qMeEzBjvrEH7yb
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
e:\KINGSOFT_DUBA\Build\Build_Src\cmpc\cmpc_en_edition\product\win32\cmmenu.pdb
GetTempFileNameW
GetPrivateProfileStringW
CreateFileW
lstrcpynW
LoadLibraryW
SizeofResource
GetProcAddress
GetWindowsDirectoryW
GetModuleFileNameW
LockResource
WideCharToMultiByte
MultiByteToWideChar
lstrcmpiW
LeaveCriticalSection
InitializeCriticalSection
GetLastError
DisableThreadLibraryCalls
RaiseException
GetVersion
LoadLibraryExW
FreeLibrary
WritePrivateProfileStringW
EnterCriticalSection
InterlockedIncrement
DeleteCriticalSection
GetCurrentProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
VirtualAlloc
GetVersionExW
GetTempPathW
FindResourceW
CloseHandle
GetPrivateProfileIntW
WriteFile
FindResourceExW
GetDriveTypeW
GetFileAttributesW
GetModuleHandleW
lstrcpynA
lstrlenW
LoadResource
GlobalLock
InterlockedDecrement
GlobalUnlock
VirtualFree
HeapCreate
GetModuleFileNameA
GetStdHandle
LoadLibraryA
ExitProcess
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
IsValidCodePage
GetOEMCP
LCMapStringW
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
Sleep
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
RtlUnwind
GetCPInfo
GetStringTypeA
GetStringTypeW
LCMapStringA
CharNextW
DestroyIcon
DrawIconEx
LoadBitmapW
RegisterClipboardFormatW
InsertMenuW
GetSysColorBrush
SetMenuItemBitmaps
GetDC
GetMenuItemCount
LoadImageW
ReleaseDC
GetMenuStringW
UnregisterClassA
CreateCompatibleBitmap
SelectObject
DeleteObject
CreateCompatibleDC
DeleteDC
RegSetValueExW
RegCreateKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegQueryInfoKeyW
SHGetDataFromIDListW
SHBindToParent
DragQueryFileW
ShellExecuteW
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
StringFromGUID2
ReleaseStgMedium
CoTaskMemFree
VarUI4FromStr
SysStringLen
SysAllocString
SysFreeString
PathFileExistsW
PathAddBackslashW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ