Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
privax_vpn_online_setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
privax_vpn_online_setup.exe
Resource
win10v2004-20240426-en
Target
privax_vpn_online_setup.exe
Size
1.2MB
MD5
9e4551fe8ac2502a78424661dad4a248
SHA1
1bdf4f1bda68d4dd75b819898c4299f07c971b70
SHA256
87dc93255f2f7ea81ad8235afdcb556d5ee0d14a28d378c5e16374d09a5ce4c0
SHA512
99da3f16f06d2eb5697435ee16dc3ed4dca7b9a195b33b6aae4024e4b5e2152c8b8b758079e69626d709bed9ad458a974bcd3f24e18bcc31e629a93e5442dfef
SSDEEP
24576:/cyvw2M/r6mEusqK01BooooEbiiIHBlPa1GJdO+eUBP1SbCjnwlv4ND:/hOrzE6ooooECK1GJdO+eiP1SbmnwKND
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
C:\BUILD\work\b1fc704878a8d844\BUILDS\Release\x86\icarus_sfx.pdb
SHGetFolderPathW
RtlNtStatusToDosError
VerSetConditionMask
RtlUnwind
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
VerifyVersionInfoW
GetPriorityClass
GetProcessTimes
K32GetProcessMemoryInfo
CreateEventW
SetEvent
ResetEvent
CreateSemaphoreW
ReleaseSemaphore
GetSystemInfo
GetVersionExW
QueryPerformanceCounter
ExpandEnvironmentStringsW
GetModuleFileNameW
GetFileAttributesW
LoadLibraryExW
GetWindowsDirectoryW
GetSystemDirectoryW
DeviceIoControl
VirtualAlloc
VirtualFree
VirtualProtect
HeapDestroy
HeapReAlloc
GlobalMemoryStatusEx
WaitForMultipleObjects
TerminateThread
GetExitCodeThread
TlsFree
SetFilePointer
SetEndOfFile
MoveFileExW
LockFileEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetFileAttributesExW
FindFirstFileW
FindClose
CreateDirectoryW
RemoveDirectoryW
FindFirstFileExW
FindNextFileW
QueryDosDeviceW
GetEnvironmentVariableW
WriteConsoleW
K32GetMappedFileNameW
CopyFileW
SetFileInformationByHandle
GetFileSizeEx
GetDiskFreeSpaceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetVolumePathNameW
GetVolumeNameForVolumeMountPointW
FindFirstVolumeW
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
VirtualQuery
GetSystemTimes
SetFilePointerEx
GetTickCount64
RaiseException
GetConsoleOutputCP
GetStdHandle
GetCommandLineA
GetFileType
SetStdHandle
FreeLibraryAndExitThread
ExitThread
InterlockedPushEntrySList
OutputDebugStringW
K32GetProcessImageFileNameW
OpenProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
FreeLibrary
LocalFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCurrentProcessId
ReadConsoleW
GetSystemTimeAsFileTime
FileTimeToSystemTime
OutputDebugStringA
GetFullPathNameW
ReadFile
GetFileInformationByHandle
DeleteFileW
LeaveCriticalSection
EnterCriticalSection
FlushFileBuffers
GetLastError
WriteFile
CreateFileW
SetLastError
Sleep
DeleteCriticalSection
InitializeCriticalSection
CompareStringW
GetModuleHandleW
GetProcessHeap
GetProcAddress
HeapAlloc
GetCurrentThreadId
GetModuleHandleExW
HeapFree
GetUserDefaultUILanguage
GetCommandLineW
GetCurrentProcess
InitializeCriticalSectionEx
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
GetConsoleMode
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetFileAttributesW
UnlockFileEx
FindResourceExW
HeapSize
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
LoadLibraryExA
HeapSetInformation
IsProcessorFeaturePresent
ExitProcess
lstrcpyW
SetDllDirectoryW
GlobalFree
GetTimeZoneInformation
LoadLibraryW
GetStringTypeW
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
FormatMessageA
GetLocaleInfoEx
WaitForSingleObjectEx
LCMapStringEx
EncodePointer
DecodePointer
GetCPInfo
MessageBoxW
PostMessageW
GetSystemMetrics
CharLowerW
SetWindowLongW
GetWindowLongW
DefWindowProcW
SystemParametersInfoW
LoadImageW
CreateWindowExW
SendMessageW
SetWindowPos
SetFocus
DestroyWindow
PostQuitMessage
DestroyIcon
GetDC
ReleaseDC
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
LoadIconW
EndPaint
BeginPaint
InvalidateRect
UpdateWindow
RegisterWindowMessageW
KillTimer
DrawTextW
SetTimer
MoveWindow
LoadCursorW
IsWindow
ShowWindow
SetWindowTextW
UnregisterClassW
GetClassInfoExW
RegisterClassExW
GetTokenInformation
IsValidSid
GetSidSubAuthority
GetSidSubAuthorityCount
DuplicateTokenEx
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
LookupAccountSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateProcessAsUserW
OpenProcessToken
ord17
GdipGetImageWidth
GdipGetImageHeight
GdipLoadImageFromStream
GdipGetPropertyItemSize
GdipDeleteGraphics
GdipImageGetFrameCount
GdipCreateFromHDC
GdipImageGetFrameDimensionsList
GdiplusStartup
GdiplusShutdown
GdipImageGetFrameDimensionsCount
GdipCloneImage
GdipImageSelectActiveFrame
GdipFree
GdipDisposeImage
GdipDrawImageRectI
GdipAlloc
GdipGetPropertyItem
PathMatchSpecW
SelectObject
DeleteObject
GetTextExtentPoint32W
SetBkMode
SetTextColor
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
CreateFontIndirectW
CoCreateInstance
CreateStreamOnHGlobal
asw_process_storage_allocate_connector
asw_process_storage_deallocate_connector
on_avast_dll_unload
onexit_register_connector_avast_2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ