Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
ClickShare_Setup.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ClickShare_Setup.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
Quick start guide.pdf
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Quick start guide.pdf
Resource
win10v2004-20220901-en
Target
R3306183_44_ApplicationSw.zip
Size
78.3MB
MD5
a55013060e7b75405355b91255923488
SHA1
8ebd7a3c098915de2c100bab7a116f8e45afd9fb
SHA256
6f681f107a5d544e5a32ea98f2797114dde4f10e3d78d713337593707ea076a4
SHA512
d1fc1253dbb60691bab43d6dafe059018aae729b0e1b89f60f85d98621dedef79e18e2e7a9d6af81e4258687096451592a6648028b592d76b50ec2ddeeefd0ac
SSDEEP
1572864:xwPW+H2SCys/CwArmXGcKqXZXYsdgPBzPnsZ7rWRq:GQysKwZVgOZORq
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameW
GetTempPathW
InitializeCriticalSectionEx
WaitForSingleObject
GetLastError
DeleteFileW
CloseHandle
RaiseException
LoadLibraryW
LoadResource
FindResourceW
DecodePointer
GetProcAddress
DeleteCriticalSection
VerSetConditionMask
GetModuleHandleW
FreeLibrary
VerifyVersionInfoW
GetTempFileNameW
MoveFileW
GetExitCodeProcess
GetFileAttributesW
CreateDirectoryW
ReadFile
WriteFile
SetFileTime
lstrlenW
CreateFileW
MultiByteToWideChar
LocalFileTimeToFileTime
GetCurrentDirectoryW
SystemTimeToFileTime
WideCharToMultiByte
SizeofResource
SetEnvironmentVariableW
FreeResource
FormatMessageW
LockResource
CreateProcessW
SetDefaultDllDirectories
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetSystemDirectoryW
lstrcmpiW
LoadLibraryExW
IsDebuggerPresent
CheckRemoteDebuggerPresent
WriteConsoleW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetFilePointer
GetCurrentProcess
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
OutputDebugStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryEnterCriticalSection
EncodePointer
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
RtlUnwind
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
GetDriveTypeW
GetFullPathNameW
GetStdHandle
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetTimeZoneInformation
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadConsoleW
HeapSize
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
SetEndOfFile
WinVerifyTrust
PathRemoveFileSpecW
PathIsUNCW
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ