Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Genome.ak.2206.1587.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Genome.ak.2206.1587.exe
Resource
win10v2004-20230915-en
Target
SecuriteInfo.com.Trojan.Genome.ak.2206.1587.exe
Size
194KB
MD5
c3bd5eb355f3bbee06210ef110a45fd9
SHA1
df854a881a0619115fb3fd89721bb7638dc1d146
SHA256
0f0486434df4f430d03742ed51818430eb3468a6ffdbe77eccfffef9eac9ce4a
SHA512
50cdc76f378e8216171b69f3780f7ad357028cce2578d8356b54905e89f2d4a6173fac41d6ad7a73f751376e69766407cff2be4fa39f853a1320f49da37484d2
SSDEEP
3072:x+COvf4UZU+WWSJSiL44jwZrc8a35ej+/5qzZOEqPqbA6:x+COvA6U+DESiL44wr7avwFOEG4A6
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateEventW
InitializeCriticalSection
DeleteCriticalSection
lstrcmpiW
lstrlenA
DebugBreak
OutputDebugStringW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
Process32NextW
Module32FirstW
CloseHandle
Process32FirstW
CreateToolhelp32Snapshot
WaitForSingleObject
SetEvent
GetVersionExW
WideCharToMultiByte
GetLocalTime
FileTimeToDosDateTime
FileTimeToLocalFileTime
ReadFile
WriteFile
SetFilePointer
SetEndOfFile
CreateFileW
GetLastError
CreateFileA
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
FindClose
GetConsoleCP
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
GetStdHandle
HeapCreate
ExitProcess
GetEnvironmentVariableW
GetModuleFileNameW
FindFirstFileW
RemoveDirectoryW
DeleteFileW
FindNextFileW
InterlockedIncrement
SetLastError
GetCurrentThreadId
RaiseException
lstrlenW
InterlockedDecrement
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
Sleep
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoW
GetSystemTimeAsFileTime
CreateThread
ExitThread
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
HeapSize
HeapReAlloc
HeapDestroy
EnterCriticalSection
GetConsoleMode
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
GetClientRect
GetWindowLongW
EnableMenuItem
EndDialog
GetSystemMenu
GetDlgItem
DefWindowProcW
CreateDialogParamW
CharNextW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
wvsprintfW
RegisterHotKey
PostMessageW
GetActiveWindow
UnregisterHotKey
DialogBoxParamW
PostQuitMessage
LoadStringW
EnableWindow
ShowWindow
SetWindowTextW
DestroyWindow
EndPaint
BeginPaint
LoadIconW
SetWindowLongW
GetParent
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
SetWindowPos
SendMessageW
UnregisterClassA
GetStockObject
DeleteObject
SetBkColor
ExtTextOutW
CreateFontW
RegCloseKey
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
ord165
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetFolderPathW
ShellExecuteExW
ShellExecuteW
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoCreateInstance
VarUI4FromStr
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ