Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.PowerShell.DownLoader.1445.12909.14248.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.PowerShell.DownLoader.1445.12909.14248.dll
Resource
win10v2004-20230703-en
Target
SecuriteInfo.com.PowerShell.DownLoader.1445.12909.14248.dll
Size
473KB
MD5
a41e2c95349731f3326defe16bf0c5eb
SHA1
d304c4cd0ff4d4ebefb072e357a26ae0b1421633
SHA256
d272a0133604711622deb2c250160c8a811df5f3141f84cadc69c55d0c3219f2
SHA512
34aebd677f81bf9667b17e4276412ef677394a801b36d4eac4f8b2c7eea3a1876becc6100e11df313c58825681e17c21b24e518b69047bbe81f0758af874bb99
SSDEEP
12288:AtBqnkbIQ6HHI/RpXupEP49v63zLrVVdWHA+f:yBqnGIQ5M6DLrVVdWHA+
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord49
ord158
ord17
ord125
ord171
ord47
ord74
ord70
ord43
ord190
ord113
ord58
ord139
ord221
ord51
ord147
ord20
ord124
ord26
ord48
ord34
ord163
ord121
ord117
ord165
ord205
ord145
ord103
ord116
ord118
ord159
ord32
ord160
ord8
ShellExecuteW
SHGetMalloc
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetFolderPathW
gethostbyname
htonl
WSAStartup
WSACleanup
ntohs
NetUserGetInfo
NetApiBufferFree
NetGetDCName
NetQueryDisplayInformation
NetLocalGroupGetInfo
NetGroupGetInfo
NetUserModalsGet
ord176
PathFileExistsW
GetTcpTable
CreateFileW
WriteFile
LocalFree
GetLastError
LocalAlloc
LoadLibraryW
GetProcAddress
FreeLibrary
RaiseException
FindFirstFileW
DeleteFileW
RemoveDirectoryW
FindNextFileW
ReadFile
SetFilePointer
FindClose
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
GetTempPathW
GetTempFileNameW
EncodePointer
GetSystemDirectoryW
LoadLibraryExW
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
GetCurrentProcess
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
ReadProcessMemory
SizeofResource
LockResource
LoadResource
FindResourceExW
FindResourceW
GetWindowsDirectoryW
IsDebuggerPresent
GetModuleFileNameW
ExpandEnvironmentStringsW
OutputDebugStringW
lstrcmpiW
DeleteCriticalSection
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
GetCurrentThreadId
FlushFileBuffers
MultiByteToWideChar
GetStringTypeW
GlobalFindAtomW
WideCharToMultiByte
GlobalAddAtomW
GlobalDeleteAtom
lstrcpynW
lstrcpyW
MulDiv
InitializeCriticalSectionAndSpinCount
DecodePointer
ExitProcess
lstrlenW
lstrcmpW
DuplicateHandle
GetStdHandle
CreateProcessW
GetLocaleInfoW
lstrcatW
GetDiskFreeSpaceW
OpenMutexW
SetLastError
TerminateProcess
GetCPInfo
TlsAlloc
TlsGetValue
TlsSetValue
SetUnhandledExceptionFilter
TlsFree
LCMapStringW
RtlUnwind
InterlockedFlushSList
GetModuleHandleExW
GetFileType
InitializeSListHead
GetSystemTimeAsFileTime
CloseHandle
GetTickCount
FormatMessageW
QueryPerformanceCounter
Sleep
GetStartupInfoW
UnhandledExceptionFilter
GetModuleHandleW
IsProcessorFeaturePresent
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
SetStdHandle
GetConsoleCP
GetConsoleMode
WriteConsoleW
MoveFileW
SetEndOfFile
GetClassNameW
EnumChildWindows
MessageBoxW
GetDC
wsprintfW
GetWindowThreadProcessId
EnumWindows
BringWindowToTop
GetForegroundWindow
GetWindowTextW
CreateWindowExW
GetWindowLongW
SendMessageW
GetDesktopWindow
RedrawWindow
IsWindow
PostMessageW
AbortDoc
EndDoc
EndPage
StartPage
StartDocW
DeleteDC
GetDeviceCaps
PrintDlgW
GetOpenFileNameW
QueryServiceStatusEx
OpenServiceW
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
GetTokenInformation
OpenProcessToken
LookupAccountSidW
LookupAccountNameW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
GetSecurityDescriptorDacl
LogonUserW
AllocateAndInitializeSid
FreeSid
GetSidSubAuthorityCount
GetSidLengthRequired
InitializeSid
GetSidIdentifierAuthority
GetSidSubAuthority
EnumServicesStatusW
LsaOpenPolicy
LsaNtStatusToWinError
LsaAddAccountRights
LsaClose
RegQueryInfoKeyW
ConvertStringSidToSidW
RegEnumValueW
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertSidToStringSidW
CloseServiceHandle
OpenSCManagerW
StartServiceW
ControlService
QueryServiceStatus
SetServiceObjectSecurity
QueryServiceObjectSecurity
ChangeServiceConfig2W
CoUninitialize
CoCreateInstance
CoTaskMemFree
CLSIDFromString
CoInitialize
VariantClear
SysFreeString
SysAllocString
VariantInit
AI_AuthorSinglePackage
AI_ResolveKnownFolders
AI_SearchOfficeAddins
AddCaspolSecurityPolicy
BrowseForFile
CheckFreeTCPPort
CheckIfUserExists
ChooseTextStyles
CloseApplication
CollectFeaturesWithoutCab
ComputeReplaceProductsList
ConfigureNonAdminServiceStart
ConfigureServFailActions
CreateExeProcess
DeleteEmptyDirectory
DeleteFromComboBox
DeleteFromListBox
DeleteShortcuts
DetectModernWindows
DetectProcess
DetectService
DisableFeatures
DoEvents
DpiContentScale
EnableDebugLog
EnumStartedServices
ExtractComboBoxData
ExtractListBoxData
GetArpIconPath
GetFreeTCPPort
GetLocalizedCredentials
GetPathFreeSpace
InstanceMajorUpgrade
JoinFiles
LaunchApp
LaunchLogFile
LoadShortcutDirs
LogOnAsAService
MixedAllUsersInstallLocation
MsgBox
MsmTrialMessage
PlayAudioFile
PopulateComboBox
PopulateListBox
PrepareUpgrade
PreserveInstallType
PreventInstancesUpgrade
PrintRTF
ProcessFailActions
RemoveCaspolSecurityPolicy
ResolveKnownFolder
ResolveServiceProperties
RestartElevated
RestoreLocation
RunAllExitActions
RunFinishActions
SetLatestVersionPath
StartWinService
StopProcess
StopWinService
TrialMessage
UninstallPreviousVersions
UpdateFeatureStates
UpdateInstallMode
UpdateMsiEditControls
ValidateInstallFolder
ViewReadMe
WarningMessageBox
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ