Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
adguardInstaller.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
adguardInstaller.exe
Resource
win11-20240419-en
Target
adguardInstaller.exe
Size
142KB
MD5
2778418f6e0d048617221386ed96109c
SHA1
bdff4500e90506ec9944691e0f449dc2d7a9454b
SHA256
93e92273784deb9659b37c211cef5366463753a90abbf1e9b9846d82ff7aaadb
SHA512
c7547344992511b53241426b2bb8c2fa55bddf6358300a2bc60a73b42bf7a493822b57a285c718e4b3cc6ed0bbbc22069fb0d908ff8e77c4e92337fd0d7cb6f0
SSDEEP
3072:r4qZHnMyBV3vChLFvGyfmKvK9MkBry8wpspx:r4qZHdV3vevK9MkhkpYx
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
ImageList_Create
GetOpenFileNameW
GetSaveFileNameW
CreateCompatibleDC
CreateFontIndirectW
CreateSolidBrush
DeleteDC
DeleteObject
GetDeviceCaps
GetStockObject
SelectObject
SetBkMode
SetTextColor
GdipAlloc
GdipCloneBrush
GdipCloneImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateFromHDC
GdipCreateHBITMAPFromBitmap
GdipCreateSolidFill
GdipDeleteBrush
GdipDeleteGraphics
GdipDisposeImage
GdipFillRectangleI
GdipFree
GdipGetImageHeight
GdipGetImageWidth
GdiplusShutdown
GdiplusStartup
CancelWaitableTimer
CloseHandle
ConnectNamedPipe
CreateDirectoryW
CreateEventW
CreateFileMappingW
CreateFileW
CreateHardLinkW
CreateIoCompletionPort
CreateNamedPipeW
CreateProcessW
CreateThread
CreateWaitableTimerW
DeleteCriticalSection
DeleteFileW
DisconnectNamedPipe
EnterCriticalSection
ExpandEnvironmentStringsW
FindClose
FindFirstFileExW
FindFirstFileW
FindNextFileW
FindResourceW
FormatMessageW
FreeLibrary
GetCommandLineW
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesExW
GetFileSizeEx
GetLastError
GetLocaleInfoW
GetLongPathNameW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetNativeSystemInfo
GetNumberOfConsoleInputEvents
GetOverlappedResult
GetProcAddress
GetProcessHeap
GetProcessIoCounters
GetProcessTimes
GetQueuedCompletionStatus
GetStartupInfoA
GetSystemTimeAsFileTime
GetThreadTimes
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadResource
LockResource
MapViewOfFile
MoveFileExW
MultiByteToWideChar
PostQueuedCompletionStatus
QueryPerformanceFrequency
ReadConsoleInputW
ReadFile
RemoveDirectoryW
SetConsoleCtrlHandler
SetConsoleMode
SetDllDirectoryW
SetEndOfFile
SetEvent
SetFileAttributesW
SetFilePointerEx
SetLastError
SetUnhandledExceptionFilter
SetWaitableTimer
SizeofResource
Sleep
SwitchToThread
TlsGetValue
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleW
WriteFile
AlphaBlend
__getmainargs
__initenv
__lconv_init
__mb_cur_max
__p__acmdln
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_daylight
_errno
_initterm
_iob
_onexit
_stricmp
_timezone
_tzset
_wcsicmp
abort
atoi
calloc
exit
fprintf
fputc
free
fwrite
localeconv
malloc
memchr
memcpy
memset
qsort
setlocale
signal
strchr
strerror
strlen
strncmp
vfprintf
wcslen
CreateStreamOnHGlobal
DragFinish
DragQueryFileW
ExtractIconExW
ILCreateFromPathW
ILFree
SHOpenFolderAndSelectItems
ShellExecuteW
Shell_NotifyIconW
CallWindowProcW
CloseClipboard
CreateAcceleratorTableW
CreateWindowExW
DefWindowProcW
DestroyAcceleratorTable
DestroyWindow
DispatchMessageW
EmptyClipboard
FillRect
GetClientRect
GetCursorPos
GetDC
GetFocus
GetMessageW
GetParent
GetWindowLongW
GetWindowPlacement
GetWindowRect
IsWindowVisible
LoadCursorW
LoadIconW
LoadImageW
MessageBoxW
OpenClipboard
PostMessageW
PostQuitMessage
PostThreadMessageW
RegisterClassExW
RegisterHotKey
ReleaseDC
ScreenToClient
SendMessageTimeoutW
SendMessageW
SetClipboardData
SetCursor
SetFocus
SetForegroundWindow
SetLayeredWindowAttributes
SetWindowLongW
SetWindowPlacement
SetWindowPos
ShowWindow
SystemParametersInfoW
TrackPopupMenuEx
TranslateAcceleratorW
TranslateMessage
UnregisterClassW
UnregisterHotKey
UpdateLayeredWindow
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlW
InternetOpenW
InternetReadFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.