Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
_igetintopc.com_Grammarly_8/Download Free Software.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
_igetintopc.com_Grammarly_8/Help.url
Resource
win10v2004-20240802-en
Target
_igetintopc.com_Grammarly_8.rar
Size
47.2MB
MD5
19aecafbbe4c4c5194b2b2a2481906b9
SHA1
1897fa6ff36dd1b53c4360141f69f870f7eaeb28
SHA256
26322db81f72d9a0020497ce56f46cca2fcd898fb9aaf56b4a7e822a83c5619b
SHA512
fd0f17b5344a8929e2ccc437ff77de0f30c5d2ea4620db336a821a84eca189eb76aa4ab8837b07475511aced348ca50058e68b6eea8411a01726475f047a936e
SSDEEP
786432:cwRh4PVTsm95lIewTO1r9g7rHYcaPuDq97wPipeNHiIMp4KgvXdKOCcmKNhOvNJf:cuhYgm5IewTmqYcJDqWPiOM6fFmKLOTf
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\paulb\code\Squirrel\squirrel.windows\src\Setup\bin\Release\Setup.pdb
GetCurrentProcess
LoadLibraryW
FreeLibrary
InitializeCriticalSectionEx
GetFileAttributesW
CreateFileW
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
WideCharToMultiByte
CreateDirectoryW
WriteFile
SetFileTime
FreeResource
SizeofResource
LockResource
CreateProcessW
GetCurrentThreadId
DecodePointer
RaiseException
LeaveCriticalSection
EnterCriticalSection
lstrcmpiW
LoadLibraryExW
GetModuleFileNameW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
DeleteFileW
CloseHandle
GetExitCodeProcess
WaitForSingleObject
MoveFileW
GetTempFileNameW
GetLastError
GetTempPathW
DeleteCriticalSection
GetModuleHandleW
GetProcAddress
lstrlenW
FindResourceW
LoadResource
VerSetConditionMask
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
WriteConsoleW
FindFirstFileExW
FindClose
HeapReAlloc
HeapSize
SetFilePointerEx
VerifyVersionInfoW
IsDebuggerPresent
OutputDebugStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
HeapFree
HeapAlloc
GetFileType
CompareStringW
LCMapStringW
wsprintfW
MessageBoxW
DestroyWindow
CharNextW
LoadStringW
GetActiveWindow
ExitWindowsEx
GetUserNameW
RegDeleteValueW
RegCreateKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
GetTokenInformation
RegCloseKey
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
ShellExecuteExW
ShellExecuteW
SHGetFolderPathW
CoTaskMemAlloc
CoTaskMemRealloc
CoInitialize
CoTaskMemFree
CoCreateInstance
VariantInit
VariantClear
SysAllocString
SysFreeString
VarUI4FromStr
URLDownloadToFileW
PathIsUNCW
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ