Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2472fe355d3b892ff43537461614d18208830e8c827dc8a43e7463938e6fc0c3.dll
Resource
win7-20240705-en
Target
2472fe355d3b892ff43537461614d18208830e8c827dc8a43e7463938e6fc0c3
Size
595KB
MD5
a5ae41f5dcd02c79f201046200cd6887
SHA1
881a62cceb045da8178e205536dce0743420dedb
SHA256
2472fe355d3b892ff43537461614d18208830e8c827dc8a43e7463938e6fc0c3
SHA512
7e49d90efda6aecb6274c7e434d7e468ad663fc0014b22741d934f61b944a81e9ac8adc11e6d8285487e435ace8e00f37d21db82bf1aee8d88d1503e04510680
SSDEEP
12288:69D5XnxqG21JyQj8ZmAOMNHoPCjR5N1Xa0WeyDkdBr7Jtg:6N5XxFYAQfAtHooNsenBr7Jtg
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\Build\Product\SiteGuard\2.0\Client\building\build\Product\SiteGuard\2.0\Client\Trunk\Build\NT32Release\SGagenti.pdb
PathIsURLW
StrRStrIA
PathFindFileNameW
PathFindFileNameA
PathAppendA
PathFileExistsA
PathAddBackslashA
PathFindExtensionA
PathRemoveExtensionA
PathFileExistsW
PathRemoveExtensionW
PathAddBackslashW
PathRemoveBackslashW
UrlUnescapeA
PathStripPathW
PathFindExtensionW
UrlCombineW
PathIsURLA
StrStrIW
StrStrIA
StrStrW
PathIsDirectoryW
PathAppendW
PathRemoveFileSpecW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
CoInternetCombineUrl
URLDownloadToFileA
CoInternetGetSession
URLDownloadToCacheFileW
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetCrackUrlW
GetUrlCacheEntryInfoW
InternetOpenA
InternetConnectA
HttpSendRequestA
InternetSetOptionA
HttpAddRequestHeadersA
InternetSetOptionW
HttpOpenRequestA
GetUrlCacheEntryInfoA
HttpQueryInfoW
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
InternetErrorDlg
InternetCloseHandle
InternetSetCookieW
CommitUrlCacheEntryW
DeleteUrlCacheEntryW
CreateUrlCacheEntryW
InternetCanonicalizeUrlW
InternetGetCookieA
GetAdaptersInfo
ReleaseSemaphore
WaitNamedPipeW
SetNamedPipeHandleState
GetSystemTimeAsFileTime
QueryPerformanceCounter
CreateSemaphoreW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
TerminateThread
WaitForMultipleObjects
GetOverlappedResult
CancelIo
GetLocalTime
GetCurrentProcessId
GetPrivateProfileIntW
GetSystemDirectoryW
WaitForSingleObject
SetEndOfFile
SetEvent
CreateEventW
lstrcmpA
GetFullPathNameW
GetVolumeInformationW
SetFileAttributesW
IsDebuggerPresent
GetModuleFileNameW
GetModuleHandleW
lstrlenW
GetProcAddress
SetLastError
GetLastError
LoadLibraryW
OutputDebugStringA
GetModuleHandleA
GetFileAttributesW
GetVersion
FreeLibrary
GetEnvironmentVariableW
DisableThreadLibraryCalls
InitializeCriticalSection
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
LoadLibraryExW
lstrcmpiW
DeleteCriticalSection
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
Sleep
GetUserDefaultUILanguage
GetCurrentProcess
CloseHandle
IsBadStringPtrW
WideCharToMultiByte
lstrlenA
IsBadStringPtrA
ReadFile
GetFileSize
CreateFileW
VirtualProtect
VirtualQuery
GetTickCount
ReadProcessMemory
IsBadReadPtr
MoveFileW
SystemTimeToFileTime
GetSystemTime
CreateDirectoryW
WriteFile
SetFilePointer
DeleteFileW
CreateFileA
FindClose
FindNextFileW
FindFirstFileW
WritePrivateProfileStringW
GetPrivateProfileSectionW
GetPrivateProfileSectionNamesW
WritePrivateProfileSectionW
GetPrivateProfileStringW
LocalFree
LocalAlloc
GetSystemDirectoryA
LoadLibraryA
DeleteFileA
GetTempFileNameA
GetTempPathA
GetVersionExW
CreateMutexW
OpenMutexW
GetLongPathNameW
InterlockedExchange
InterlockedCompareExchange
SwitchToThread
GetTempFileNameW
GetTempPathW
RemoveDirectoryW
GetCurrentDirectoryW
lstrcpynW
CharLowerBuffW
CharNextW
IsWindow
IsWindowVisible
PostMessageW
GetClassNameW
GetParent
GetSystemMetrics
GetWindowRect
CharUpperW
MonitorFromRect
GetMonitorInfoW
SetWindowPos
GetDesktopWindow
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
CharUpperBuffW
EnableWindow
FindWindowExW
GetWindowThreadProcessId
LoadStringW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyA
RegQueryValueExA
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
SHGetFolderPathW
SHGetSpecialFolderPathW
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
StringFromCLSID
ProgIDFromCLSID
CoGetClassObject
StringFromGUID2
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
VarBstrCat
VarBstrCmp
VariantInit
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
VariantClear
SysAllocString
_stricmp
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_except_handler4_common
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__clean_type_info_names_internal
wcscmp
wcsncat_s
_wcslwr_s
wcsstr
??2@YAPAXI@Z
_purecall
??_U@YAPAXI@Z
memcmp
wcscpy_s
_beginthreadex
_vsnprintf
_wsplitpath_s
_wmkdir
toupper
wcscspn
sprintf_s
strcmp
strtoul
strcat_s
_wcsrev
wcstod
free
wcstoul
_vsnwprintf
_wcsdup
strcpy_s
strtok_s
_wtoi64
_vsnprintf_s
strchr
wcstok_s
_snprintf_s
wcscat_s
wcsnlen
malloc
_wcsnicmp
clock
memcpy
_wtoi
_snwprintf_s
_wcsicmp
calloc
strncmp
_strlwr_s
_ultoa_s
_vscwprintf
vswprintf_s
strlen
strncat_s
strstr
?terminate@@YAXXZ
wcsncpy_s
memmove_s
wcslen
wcstol
tolower
isxdigit
wcschr
_strnicmp
_time64
_localtime64_s
wcsncmp
strncpy_s
memcpy_s
_vsnwprintf_s
_recalloc
wcsrchr
??_V@YAXPAX@Z
_CxxThrowException
memset
__CxxFrameHandler3
??3@YAXPAX@Z
htonl
getservbyname
htons
inet_addr
WSAGetLastError
gethostbyname
gethostbyaddr
getservbyport
ntohs
gethostname
inet_ntoa
WSASetLastError
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ