Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
6f1957b03b06baccfcd3db506607c2ae66c7a157f2f41c8319331c5430b20388.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6f1957b03b06baccfcd3db506607c2ae66c7a157f2f41c8319331c5430b20388.dll
Resource
win10v2004-20231215-en
Target
6f1957b03b06baccfcd3db506607c2ae66c7a157f2f41c8319331c5430b20388
Size
1.2MB
MD5
9bddb1b383f79ae4112ce05df70720b2
SHA1
d99dc8f9627296ed52903bad1fd45dd1f8f44b8d
SHA256
6f1957b03b06baccfcd3db506607c2ae66c7a157f2f41c8319331c5430b20388
SHA512
5ba6231afe464f2ce97425bb770b0909d4f6631ffa0af96a6d727378c7a799fb0a805dc93719b1b5d7df5ee9c21845f12ebe0ff3c5e790d5e7c351b5774fdc1a
SSDEEP
24576:YWAVMeRaiCvj8vMxpBQ99PhH+P6TjlyFyWPJkdnITYUj2Ew/PRNVs+R01oX8IoKf:YWydypy992ajPdnITYUj2Ew/PRNVs+R/
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DecodePointer
DeleteCriticalSection
DeleteFileW
WritePrivateProfileStringW
lstrcpynW
TerminateProcess
GetModuleFileNameW
GetProcessId
WaitForSingleObject
GetFileAttributesW
OpenProcess
SetFileAttributesW
Sleep
CloseHandle
LoadLibraryW
GetProcAddress
MoveFileExW
FreeLibrary
GetDriveTypeW
lstrlenW
GetShortPathNameW
lstrcmpiW
GetCurrentProcessId
MultiByteToWideChar
GlobalAlloc
GlobalFree
WideCharToMultiByte
lstrcpyW
GetCommandLineW
LocalFree
GetTickCount
MoveFileW
GetPrivateProfileStringW
lstrcatW
CreateProcessW
GetVersionExW
WriteFile
SetFilePointer
CreateFileW
GetFileSize
RemoveDirectoryW
MoveFileWithProgressW
CopyFileExW
LockResource
GetSystemInfo
LoadResource
FindResourceW
GetModuleHandleW
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
QueryDosDeviceW
GetCurrentProcess
RaiseException
WaitForMultipleObjects
GetACP
GetExitCodeProcess
GetCurrentThreadId
SuspendThread
GetExitCodeThread
TerminateThread
SwitchToThread
OpenThread
ResumeThread
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetVolumeInformationW
GetDiskFreeSpaceW
GetLogicalDriveStringsW
FindNextFileW
FindClose
HeapFree
HeapAlloc
GetProcessHeap
CreateMutexW
ReleaseMutex
ExpandEnvironmentStringsW
GetEnvironmentVariableW
ReadFile
SetFileTime
SetEndOfFile
GetFileTime
CreateDirectoryW
GetFullPathNameW
GetTempPathW
GetCurrentDirectoryW
GetWindowsDirectoryW
CopyFileW
CreateEventW
SetEvent
ResetEvent
InterlockedExchangeAdd
LoadLibraryExW
InterlockedExchange
SetLastError
GlobalMemoryStatusEx
GetFileType
GetFileSizeEx
GetLastError
InitializeCriticalSectionAndSpinCount
DeviceIoControl
GetConsoleCP
GetStdHandle
FileTimeToSystemTime
WriteConsoleW
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetModuleFileNameA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
HeapSize
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
IsDebuggerPresent
OutputDebugStringW
FormatMessageW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
HeapCreate
VirtualProtect
InterlockedCompareExchange
Thread32Next
Thread32First
CreateToolhelp32Snapshot
HeapReAlloc
HeapDestroy
GetThreadContext
FlushInstructionCache
SetThreadContext
VirtualFree
VirtualAlloc
VirtualQuery
RtlUnwind
InterlockedFlushSList
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
wsprintfW
GetUserNameW
RegCreateKeyExW
AdjustTokenPrivileges
DuplicateTokenEx
ShellExecuteExW
SHChangeNotify
ord190
SHGetSpecialFolderPathW
ShellExecuteW
ord155
SHGetFolderPathW
CoCreateInstance
PropVariantClear
CoInitialize
CoUninitialize
StrCatW
StrStrIW
StrCmpW
PathAppendW
SHStrDupW
PathRemoveFileSpecW
WTSFreeMemory
WTSQuerySessionInformationW
CheckParentProcess
CleanAnimateMark
CopyImportantFileWithTransaction
CreateDownloadFolder
CreateLowIntegrityProcess
CreateReleaseFileProcessTmpFile
DeleteCustom2345ExplorerTargetShortCut
DeleteInstallFile
DeleteScheduledTask
EncodeJifenID
EncodeRecommendPcsafeUnionCustom
EncodeUnion
FindProc
FindProc2345Explorer
FindSubstring
Get2345ExplorerPath
GetCurrentSystemTime
GetDownloadSafecenterCloudConfig
GetInstallSafecenterCloudConfig
GetJifenInstallerParams
GetJifenUnionNameInstallerParams
GetParentProcessName
GetUnionCustomInstallerParams
GetUnionNameInstallerParams
ImpersonateUser
Init
InitCustomStatService
InitStatService
Install2345MgrDLL
IsWin10OrLater
KillProc
KillProc2345Explorer
KillProcessByPathAndName
KillProcessByPid
MyMoveFile
OpenUrl
PinToStartMenu
PinToTaskBar
PreProcessShortCut
RevertUser
SendCustomStatInfo
SendStatInfo
SetInstallErrorPopStatistics
ShieldUnlock
StartCloudConfigRequest
StartInstallServiceProcess
StartPreReleaseFileProcess
StopShield
TerminateCloudConfigRequest
UnInstallSafeCenter
UninitCustomStatService
UninitStatService
Uninstall2345MgrDLL
UninstallShield
UninstallToolFile
UninstallToolProcess
UnpinFromStartMenu
UnpinFromTaskBar
WaitForReleaseFileProcess
WriteInstallData
WriteLog
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ