Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
HFlashPlayer.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
HFlashPlayer.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
flashplayer.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
flashplayer.exe
Resource
win10v2004-20230221-en
Target
HFlashPlayer-windows-0.1.1.zip
Size
6.4MB
MD5
329c7ae58c7ae013be494462a69bc7a1
SHA1
7fe7caf51d94fae6e6187073151366ef19a7231c
SHA256
2c341e9ae196b1bcb137a43be29251e93561f9d578b08d2863529585039e885b
SHA512
24bd8262909d03ddeb8108b04a8b0bf8012be60080294e761d12fc2bb4555ba53cf0000823d828eeb56f7b9237dc1295482764b539f91fbcb5150658ced01689
SSDEEP
196608:MzHDxzzcsrwzmxP1khXTELnUZD5imvX3kLy01a:MHlcsrc+65EMEmPUyOa
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
SERIALNUMBER=2748129,CN=Adobe Systems Incorporated,OU=Flash Player,O=Adobe Systems Incorporated,POSTALCODE=95110,STREET=345 Park Avenue,L=San Jose,ST=California,C=US,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e
CN=DigiCert EV Code Signing CA (SHA2),OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReadFile
SetFilePointer
GetFileSize
CreateFileW
GetModuleFileNameA
GetCommandLineW
SetEndOfFile
WriteFile
CreateFileA
GetFileAttributesA
GetStartupInfoW
GetCommandLineA
ExitProcess
RemoveDirectoryW
CopyFileW
GetModuleFileNameW
GetCPInfo
GetACP
IsDBCSLeadByte
HeapSize
DeviceIoControl
CreateProcessA
GetTempPathA
FindNextFileW
GetSystemWow64DirectoryW
ExpandEnvironmentStringsA
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
GetLongPathNameW
CreateProcessW
GetTempFileNameA
CreateDirectoryA
DeleteFileA
GetFileAttributesW
CreateMutexA
SetFilePointerEx
GetFileSizeEx
GetFileAttributesExW
GetFileInformationByHandle
GetVolumeInformationW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
ExpandEnvironmentStringsW
OutputDebugStringA
MoveFileExW
LoadLibraryA
GetSystemDirectoryA
FreeLibrary
GetVersionExW
GetCurrentProcess
VirtualQuery
ExitThread
GetUserDefaultLangID
GetUserDefaultUILanguage
VerifyVersionInfoW
VerSetConditionMask
GlobalFree
CreateThread
LockResource
LoadResource
FindResourceExA
FindResourceExW
GlobalAlloc
GlobalUnlock
GlobalLock
QueryPerformanceCounter
QueryPerformanceFrequency
GlobalSize
QueueUserAPC
OpenThread
SleepEx
SetUnhandledExceptionFilter
GetCurrentProcessId
GetProcessTimes
RaiseException
FlushInstructionCache
SetLastError
TerminateThread
CreateEventW
SetEvent
ResetEvent
WaitForMultipleObjects
CreateWaitableTimerW
GetTickCount
SetThreadPriority
GetTimeZoneInformation
GetSystemTime
SystemTimeToFileTime
DebugBreak
GetModuleHandleW
LCMapStringW
GetExitCodeThread
DuplicateHandle
GetCurrentThread
MapViewOfFile
UnmapViewOfFile
ReleaseMutex
CreateFileMappingA
CompareFileTime
ReleaseSemaphore
CreateSemaphoreW
SetThreadAffinityMask
CreateEventA
CreateWaitableTimerA
SetWaitableTimer
CancelWaitableTimer
InterlockedExchangeAdd
GetVersionExA
GetVersion
VirtualAlloc
VirtualFree
FlushFileBuffers
GlobalMemoryStatusEx
IsDebuggerPresent
SetSystemTime
FileTimeToSystemTime
TlsAlloc
TlsFree
ResumeThread
CreateTimerQueueTimer
DeleteTimerQueueTimer
CreateSemaphoreA
HeapAlloc
HeapFree
HeapUnlock
HeapWalk
HeapLock
HeapCreate
HeapDestroy
VirtualProtect
GetNumberFormatW
GetCurrencyFormatW
CompareStringW
GetDateFormatW
GetTimeFormatW
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
GetProcessAffinityMask
IsProcessorFeaturePresent
GetStartupInfoA
RtlUnwind
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
HeapReAlloc
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetOEMCP
IsValidCodePage
LCMapStringA
GetConsoleCP
GetConsoleMode
SetConsoleCtrlHandler
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
SetEnvironmentVariableA
LocalAlloc
GlobalMemoryStatus
FlushConsoleInputBuffer
GetProcAddress
WaitForSingleObject
GetExitCodeProcess
CloseHandle
FindFirstFileW
FindClose
GetSystemDirectoryW
LoadLibraryW
GetModuleHandleA
GetTempPathW
GetTempFileNameW
GetLastError
DeleteFileW
CreateDirectoryW
GetSystemInfo
SwitchToThread
TlsGetValue
TlsSetValue
GetCurrentThreadId
LeaveCriticalSection
ReadConsoleInputA
SetConsoleMode
FindFirstFileA
EnterCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
InterlockedCompareExchange
GetLocaleInfoW
Sleep
FileTimeToLocalFileTime
GetDriveTypeA
GetFullPathNameA
PeekNamedPipe
GetCurrentDirectoryA
CryptEncrypt
CryptDestroyKey
CryptImportKey
CryptSetKeyParam
CryptGetHashParam
CryptHashData
CryptDestroyHash
CryptAcquireContextA
CryptCreateHash
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RegOpenKeyA
CryptAcquireContextW
CryptGenRandom
CryptReleaseContext
RegOpenKeyExA
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExW
CryptDecrypt
IAEModule_AEModule_PutKernel
IAEModule_IAEKernel_LoadModule
IAEModule_IAEKernel_UnloadModule
_WinMainSandboxed@20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ