Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
Listdlls64.1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Listdlls64.1.exe
Resource
win10v2004-20240802-en
Target
Listdlls64.1.exe
Size
215KB
MD5
8336396d50dcc9d5a5f66b078a8460dc
SHA1
42bf0bb282512e4c638b8f03617dd973ee09afd9
SHA256
29d23bc492e48a5ae68444302d3430e07d08e04278d53aa70d9367d9cf8bceb7
SHA512
08f34405f8d5ebf695391f9cb1deb6eb22b318b698ce9540d37eae45d36476a96d379e9f338c64d5f2f3e9674751bdb7f3661845530605b8fb1eb14ee91702e2
SSDEEP
3072:CcSIBqf7UxpYs68VYO1KpygluJrTiMLGcaad5UFyn853tOwDmh8DaNv3EL:Ckqf7Uxv9VYO1s+rTiMCOoRb0py
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
GetFileVersionInfoA
GetFileVersionInfoW
VerQueryValueA
VerQueryValueW
SymSetOptions
EnumerateLoadedModules64
SymInitialize
ImageNtHeader
CertGetNameStringA
CertDuplicateCertificateContext
CloseHandle
LoadLibraryA
FindResourceW
FindResourceExW
CreateFileA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
SetLastError
GetModuleHandleA
GetFileType
GetModuleFileNameA
GetModuleFileNameW
LocalAlloc
LocalFree
GetStdHandle
GetCommandLineW
GetVersion
OpenProcess
ReadProcessMemory
ReadFile
FormatMessageA
ExpandEnvironmentStringsA
GetStringTypeW
ReadConsoleW
WriteConsoleW
SetFilePointerEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
SizeofResource
LoadResource
Sleep
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetProcAddress
LockResource
GetCurrentProcessId
DecodePointer
CompareStringW
LCMapStringW
GetTimeZoneInformation
SetEnvironmentVariableA
QueryPerformanceCounter
CreateFileW
LoadLibraryExW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
EncodePointer
IsProcessorFeaturePresent
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
SetStdHandle
ExitProcess
GetModuleHandleExW
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
GetCommandLineA
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
WriteFile
GetCurrentThreadId
GetConsoleCP
FlushFileBuffers
GetSystemTimeAsFileTime
LoadCursorA
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextA
GetDlgItem
EndDialog
DialogBoxIndirectParamA
SendMessageA
EndPage
StartPage
EndDoc
StartDocA
SetMapMode
GetDeviceCaps
PrintDlgA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegSetValueExA
RegCreateKeyA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ