Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
03d647f66065d03b4b03c5965688c08853eb1542bca1d371d5a1e59f2183f3b7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03d647f66065d03b4b03c5965688c08853eb1542bca1d371d5a1e59f2183f3b7.dll
Resource
win10v2004-20231215-en
Target
03d647f66065d03b4b03c5965688c08853eb1542bca1d371d5a1e59f2183f3b7
Size
1.4MB
MD5
9314d1bf968eb3529fc0048e9bd8cc6e
SHA1
33ed0954e05dd952f2b5ea4e0f3d54490cadcff8
SHA256
03d647f66065d03b4b03c5965688c08853eb1542bca1d371d5a1e59f2183f3b7
SHA512
12a6e12aca43fd731524f94fe0459c97f942befafc47299ba4acbafa1c46e1e92dc788a59df20b4f1924325fb74916bf2d6f95dc3d5fdf72c7626821231972c6
SSDEEP
24576:iDEhL47pTOAVjfhzsXBn6NjVpWBcXEDYVU85sqHLtFAWruNoWdj:NSiXBnAVpWBmFAWqNx
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
E:\runtime\build_temp\pdb\Win32_release_static\KKRtNsisMiniExtend.pdb
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
InternetOpenUrlA
HttpOpenRequestW
InternetOpenW
InternetSetFilePointer
HttpQueryInfoW
InternetOpenUrlW
InternetQueryOptionW
HttpAddRequestHeadersW
InternetReadFile
InternetSetOptionW
InternetConnectW
InternetCloseHandle
HttpSendRequestW
InternetOpenA
InternetSetOptionA
GetModuleFileNameExW
GetProcessImageFileNameW
NetUserGetLocalGroups
NetApiBufferFree
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiGetDeviceRegistryPropertyW
GetLastError
DisableThreadLibraryCalls
GlobalAlloc
GlobalFree
GetCurrentProcessId
SystemTimeToFileTime
CreateProcessW
lstrcpyW
GetSystemTime
GetExitCodeProcess
InterlockedDecrement
GetVersionExW
GetSystemInfo
GetProcAddress
GetModuleHandleW
lstrcmpiW
HeapFree
SetPriorityClass
GetCurrentProcess
SetThreadPriority
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
GetCurrentThread
QueryPerformanceFrequency
GetThreadPriority
RaiseException
LoadLibraryW
HeapAlloc
DecodePointer
GetPriorityClass
IsProcessorFeaturePresent
DeleteCriticalSection
GetProcessHeap
GlobalMemoryStatusEx
QueryPerformanceCounter
FreeLibrary
WideCharToMultiByte
LocalFree
CreateDirectoryW
RemoveDirectoryW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
MoveFileExW
CopyFileW
GetDriveTypeW
GetModuleFileNameW
Module32FirstW
Module32NextW
GetTickCount
GetCurrentThreadId
ResumeThread
QueryDosDeviceW
GetLogicalDriveStringsW
GetFileSizeEx
SearchPathW
SetLastError
GetFullPathNameW
GetLongPathNameW
lstrlenW
DeviceIoControl
SetFileTime
GetTempPathW
CreateFileW
GetSystemDirectoryW
GetFileInformationByHandle
GetFileAttributesExW
GetCurrentDirectoryW
GetWindowsDirectoryW
SetCurrentDirectoryW
SystemTimeToTzSpecificLocalTime
MoveFileW
LoadLibraryExW
SizeofResource
WritePrivateProfileStringW
ExpandEnvironmentStringsW
WaitForSingleObject
Sleep
EnumResourceNamesW
FreeResource
GetVersion
LockResource
LoadResource
FindResourceW
WTSGetActiveConsoleSessionId
FormatMessageW
lstrcatW
GlobalLock
GlobalUnlock
ReadFile
WriteFile
SetFilePointer
SetEndOfFile
GetFileSize
GetFileTime
FindFirstFileW
FindNextFileW
FindClose
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetModuleHandleA
LocalAlloc
CreateProcessA
lstrcmpW
VerifyVersionInfoW
VerSetConditionMask
lstrcmpA
OutputDebugStringW
InterlockedPushEntrySList
RtlUnwind
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
CreateEventW
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
TerminateProcess
FileTimeToSystemTime
CloseHandle
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
InterlockedFlushSList
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
GetACP
HeapReAlloc
GetPrivateProfileStringW
GetEnvironmentVariableW
OpenProcess
SetEnvironmentVariableW
lstrcpynW
GetStdHandle
GetFileType
GetTimeZoneInformation
SetConsoleCtrlHandler
FindFirstFileExA
FindFirstFileExW
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
HeapSize
SetStdHandle
WriteConsoleW
OutputDebugStringA
WaitForSingleObjectEx
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetTempFileNameW
VirtualQuery
GetUserDefaultLCID
IsIconic
SetForegroundWindow
GetWindowTextW
OpenClipboard
CloseClipboard
EmptyClipboard
SetClipboardData
LoadStringW
GetActiveWindow
ShowWindow
GetDlgItem
GetParent
PostMessageW
GetWindowRect
GetClassInfoW
IsWindowEnabled
EnumWindows
GetClassNameW
UnregisterClassW
GetSystemMetrics
GetWindowThreadProcessId
SendMessageTimeoutW
wsprintfW
GetDesktopWindow
IsZoomed
GetClientRect
GetForegroundWindow
AttachThreadInput
MapWindowPoints
IsChild
GetMonitorInfoW
GetShellWindow
SetWindowTextW
MonitorFromWindow
SetWindowPos
IsWindowVisible
GetWindow
GetWindowTextLengthW
GetWindowLongW
CombineRgn
CreateRectRgn
GetOpenFileNameW
GetFileSecurityW
GetLengthSid
LookupAccountNameW
GetTokenInformation
RegDeleteKeyW
BuildExplicitAccessWithNameW
SetEntriesInAclW
RegCreateKeyExW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
RegSaveKeyW
RegEnumKeyExW
RegSetValueExW
RegLoadKeyW
RegRestoreKeyW
RegDeleteValueW
GetUserNameW
RegEnumValueW
RegCloseKey
RegEnumKeyW
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueExW
FreeSid
OpenProcessToken
CopySid
AllocateAndInitializeSid
EqualSid
GetAce
GetSecurityDescriptorDacl
AdjustTokenPrivileges
LookupPrivilegeValueW
AddAccessAllowedAce
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CheckTokenMembership
ShellExecuteExW
SHGetPathFromIDListW
ShellExecuteW
SHBrowseForFolderW
DragQueryFileW
SHGetSpecialFolderPathW
ord680
SHGetFileInfoW
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
CoInitialize
CreateErrorInfo
SetErrorInfo
SysFreeString
VariantClear
GetErrorInfo
SysAllocStringLen
VariantInit
SysAllocString
VariantChangeType
PathCanonicalizeW
AddToFirewall
CheckInstallLimit
CheckSoftInstalled
ConvertSoftInstallTime
CreateSoftInstalltime
CryptSubChannel
Exec
ExecWait
ExecWaitHide
ForceDeleteFile
GetChannelFromName
GetDefaultBrowser
GetExeName
GetNameOption
GetOptions
GetParentFileName
GetParentPid
GetSoftPublicParam
GetSpecialBuild
GetSubChannel
GetSubfix
GetTime
GetType
PinToTaskbar
PrintDebugMessage
QueryIsShowUninstallAdvert
QueryUninstallAdvert
QueryUrl
SendExitInstallStatEx
SendUserQuestionStatEx
SetIEEmulation
TaskKill
TaskKillByHwnd
TaskKillByPath
UnPinFromTaskBar
UnPinFromTaskBar2
UrlEncode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ