Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.not-a-virus.AdWare.Win32.Taogis.23092.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.not-a-virus.AdWare.Win32.Taogis.23092.dll
Resource
win10v2004-20231222-en
Target
SecuriteInfo.com.not-a-virus.AdWare.Win32.Taogis.23092.10604
Size
143KB
MD5
aa63d34330fa5a98c1a624ba6b38be5a
SHA1
3b031733500f8fd073d1ab65722d561723e4730e
SHA256
8833e061f21eba5b52b7c5260dd8e6ef1d32a51ba3e96a38df12283a1e72b6ad
SHA512
2b4b6321b37226035bf67c3ab7a10bd318f5c34926731743652f7a087f362e1d4996de77ad6f564b8c870918377804e05f1045f1fd5960b563343227a56e2330
SSDEEP
1536:I00KellFW4ulAG7dOI8LQfiGq8uLaNgKfwk64/hg+P4vestyjlBjGve:rzUc4rG7ciqGomdf6+P4vestyRBj
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHGetValueW
StrStrIW
SHSetValueW
PathFileExistsA
PathRemoveFileSpecW
PathAppendW
SHDeleteValueW
InternetCrackUrlW
FindFirstUrlCacheEntryW
DeleteUrlCacheEntryA
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
DeleteUrlCacheEntryW
FindCloseUrlCache
FindNextUrlCacheEntryW
URLDownloadToFileA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrcmpiW
InterlockedDecrement
CloseHandle
GetCurrentProcess
FreeLibrary
GetProcAddress
LoadLibraryA
DeleteFileW
LoadLibraryW
GetModuleFileNameW
WideCharToMultiByte
CreateDirectoryA
DeleteFileA
SetFileAttributesA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetFileSize
CreateFileW
ExpandEnvironmentStringsW
GetSystemDefaultLangID
Thread32Next
Thread32First
CreateToolhelp32Snapshot
InterlockedIncrement
Process32NextW
Process32FirstW
GetCurrentProcessId
FlushFileBuffers
DebugBreak
OutputDebugStringW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
Sleep
GetSystemDirectoryW
GetLocalTime
GetPrivateProfileStringW
GetTickCount
WritePrivateProfileStringW
GetPrivateProfileIntW
MoveFileW
SetFileAttributesW
GetTempFileNameW
GetTempPathW
CreateThread
GetVersionExA
DisableThreadLibraryCalls
GetCurrentThreadId
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
lstrlenA
IsDebuggerPresent
SetUnhandledExceptionFilter
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
HeapSize
UnhandledExceptionFilter
TerminateProcess
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleA
HeapCreate
HeapDestroy
VirtualAlloc
VirtualFree
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
HeapAlloc
HeapFree
RtlUnwind
HeapReAlloc
GetCommandLineA
GetProcessHeap
MessageBoxW
CharNextW
LoadStringW
UnhookWindowsHookEx
GetParent
GetClassNameW
GetWindowThreadProcessId
FindWindowExW
IsWindow
PostMessageW
SetWindowLongW
PeekMessageW
wsprintfW
SetWindowsHookExW
CallNextHookEx
PostThreadMessageW
UnregisterClassA
RegCloseKey
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
ShellExecuteW
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
StringFromGUID2
CoTaskMemAlloc
VariantChangeType
VariantCopy
VariantClear
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SysStringLen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
KNetTrustAddr_IESupport
Rundll32
Stop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ