Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8064ae1cf196a7651b4d10c519ec89180dae6d16d602f8549692a70b050e9c82.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8064ae1cf196a7651b4d10c519ec89180dae6d16d602f8549692a70b050e9c82.dll
Resource
win10v2004-20241007-en
Target
8064ae1cf196a7651b4d10c519ec89180dae6d16d602f8549692a70b050e9c82.exe
Size
1.3MB
MD5
37ed0308109d6524658df709e9dd2bea
SHA1
feb16fe282e86f85ec288cd3e8f6ffa398a1dec1
SHA256
8064ae1cf196a7651b4d10c519ec89180dae6d16d602f8549692a70b050e9c82
SHA512
b7fcaf537c2b4872c9e72fa6d46898516ce2546b13949f606b1a887567066a578ea737618fd00576bad255cd403af5886f1d6d4e38902eed89f9d4b4d1ebe402
SSDEEP
24576:n1FCKisuEMfumVLFMnGC786ZQkh4lZ181gUOrPdIdH6:HCRsuOsunGC7jXIZWkrPdUH6
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
d:\Jenkins\SAS Redistributable\workspace\src\Binary\Release\SdAppServices_x64.pdb
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetLastError
GetTickCount
GlobalFree
AddAtomA
Sleep
WaitForMultipleObjects
VerSetConditionMask
VerifyVersionInfoW
LoadLibraryW
GetProcAddress
QueryPerformanceCounter
QueryPerformanceFrequency
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
ReadFile
GetCurrentDirectoryW
CreateProcessA
SetHandleInformation
CreatePipe
GetCurrentProcessId
ResetEvent
SetEvent
CreateEventW
FreeLibraryAndExitThread
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
ReleaseMutex
WaitForSingleObject
GetComputerNameW
CreateMutexW
lstrlenA
lstrcmpA
GetComputerNameA
FileTimeToSystemTime
FindClose
FindFirstFileW
LocalFree
LocalAlloc
GetModuleFileNameW
GetModuleHandleExA
CreateDirectoryW
SetFilePointerEx
ReadConsoleW
DeleteFileW
GetConsoleMode
GetConsoleCP
WriteFile
HeapFree
ExitProcess
SetEndOfFile
HeapReAlloc
HeapAlloc
GetModuleHandleExW
ExitThread
CreateThread
FlushFileBuffers
GetTimeZoneInformation
GetStdHandle
GetACP
CloseHandle
GetFileAttributesA
MoveFileExW
GetFullPathNameW
HeapSize
WriteConsoleW
GetModuleFileNameA
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetCPInfo
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetCurrentThreadId
RtlPcToFileHeader
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwindEx
FreeLibrary
LoadLibraryExW
CreateFileW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
GetLastInputInfo
DispatchMessageW
TranslateMessage
CallMsgFilterW
PostQuitMessage
PeekMessageW
MsgWaitForMultipleObjects
EnableWindow
RegQueryValueExW
GetNamedSecurityInfoW
CryptGenRandom
CryptAcquireContextA
CryptEncrypt
CryptDecrypt
CryptSetKeyParam
CryptImportKey
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
RegSetValueExW
RegCreateKeyExW
RegCloseKey
CreateWellKnownSid
RegOpenKeyExW
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
LookupAccountNameA
SetNamedSecurityInfoW
SetEntriesInAclW
ShellExecuteExW
SHFileOperationW
ShellExecuteW
SHGetFolderPathW
CoCreateInstance
CoUninitialize
CoInitializeEx
CoSetProxyBlanket
VariantChangeType
VariantClear
VariantInit
SysFreeString
SysAllocString
PathAppendW
PathRemoveFileSpecW
PathFileExistsW
GetAdaptersInfo
CryptStringToBinaryW
CryptBinaryToStringW
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpGetProxyForUrl
WinHttpOpenRequest
WinHttpConnect
WinHttpSetTimeouts
WinHttpOpen
WinHttpGetIEProxyConfigForCurrentUser
WinHttpCreateUrl
WinHttpCloseHandle
WinHttpCrackUrl
sas_AAAA
sas_AAAB
sas_AAAC
sas_AAAD
sas_AAAE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ