Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
HitmanPro_x64 (1).exe
Resource
win7-20231023-en
Target
HitmanPro_x64 (1).exe
Size
13.6MB
MD5
da6e09203025fe24f86c81565eb4276d
SHA1
1c37c76f96c63f5c324c490a394b7831b8894fc8
SHA256
7352c0220fb7dfa5749b739cd2a30c37c1bfe2629f2d63f2f0e16b96eaf540de
SHA512
1304de5487f65f8d3d8b3c3c3f04d92a5d533fc9ada254d059b95d7ecca9f1aba66d171d44fa21f42d6de853aa294146f2a315a24f3b8a9d4b848c0e9504164d
SSDEEP
393216:bJN940Cl4tgPm25MJFjrTuSne6Jb7N/Sk:bBKm2ufjrCq
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetModuleHandleW
GetLastError
WaitForMultipleObjects
CreateEventW
CloseHandle
SetEvent
ResetEvent
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateThread
SignalObjectAndWait
TerminateThread
Sleep
VirtualAlloc
VirtualFree
OpenProcess
VirtualQueryEx
WaitForSingleObjectEx
CreateWaitableTimerW
SetWaitableTimer
GetVersion
LocalAlloc
LocalFree
GetProcAddress
GlobalMemoryStatus
FreeLibrary
Heap32ListNext
Heap32Next
QueryPerformanceCounter
Heap32First
Heap32ListFirst
GetTickCount
GetSystemTimeAsFileTime
Thread32First
Thread32Next
VirtualUnlock
LoadLibraryA
Process32FirstW
VirtualLock
Module32FirstW
GetSystemInfo
Process32NextW
CreateToolhelp32Snapshot
GetCurrentThreadId
Module32NextW
GetCurrentProcessId
QueryPerformanceFrequency
SetThreadPriority
GetCurrentThread
SystemTimeToFileTime
LocalFileTimeToFileTime
CompareFileTime
GetLocalTime
FileTimeToSystemTime
SetLastError
GetSystemDirectoryW
VerifyVersionInfoW
VerSetConditionMask
GetWindowsDirectoryW
CreateFileW
DeviceIoControl
GetFileInformationByHandle
GetModuleHandleA
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
FindResourceW
SizeofResource
LoadResource
LockResource
FreeResource
OutputDebugStringW
WriteFile
ReadFile
PeekNamedPipe
WaitNamedPipeW
GetCalendarInfoW
GetFileSizeEx
GetNativeSystemInfo
FormatMessageW
FileTimeToLocalFileTime
GetLocaleInfoW
TryEnterCriticalSection
GetTempPathW
RemoveDirectoryW
FindFirstFileW
FindClose
FindNextFileW
GetFileAttributesW
GetCurrentProcess
RegisterWaitForSingleObject
UnregisterWaitEx
FlushFileBuffers
DisconnectNamedPipe
GetOverlappedResult
GetComputerNameW
GetFileAttributesExW
GetFileTime
SetFileTime
ResumeThread
GetCommandLineW
CreateProcessW
ConvertDefaultLocale
GetLogicalDriveStringsW
QueryDosDeviceW
SetThreadAffinityMask
DeleteFileW
GetModuleFileNameW
SetErrorMode
GetStdHandle
GetDriveTypeW
GetVolumeInformationW
GetFileSize
GetModuleHandleExA
SetFileAttributesW
CopyFileW
TerminateProcess
GetNumberFormatW
GetVersionExW
WTSGetActiveConsoleSessionId
ProcessIdToSessionId
GetProcessTimes
LoadLibraryW
GlobalAlloc
OpenEventW
AllocConsole
LoadLibraryExW
MultiByteToWideChar
SetUnhandledExceptionFilter
VirtualProtect
VirtualQuery
OpenThread
SuspendThread
GetThreadContext
SetThreadContext
SearchPathW
GetSystemDirectoryA
LoadLibraryExA
DuplicateHandle
CreateSemaphoreW
ReleaseSemaphore
GetEnvironmentVariableW
WideCharToMultiByte
GetSystemWow64DirectoryW
GetSystemTime
GetExitCodeProcess
CreateHardLinkW
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
GetVolumeInformationA
ExpandEnvironmentStringsW
SetHandleInformation
CreateNamedPipeW
ConnectNamedPipe
GetThreadPriority
GetLongPathNameW
VirtualAllocEx
ReadProcessMemory
VirtualFreeEx
MoveFileW
GetCurrentDirectoryW
GetCurrentDirectoryA
GlobalFree
SetEndOfFile
SetFilePointerEx
FormatMessageA
GetFullPathNameW
GetFullPathNameA
CreateFileA
CreateMutexW
HeapCompact
SetFilePointer
MapViewOfFile
UnmapViewOfFile
UnlockFile
LockFile
UnlockFileEx
HeapDestroy
GetFileAttributesA
HeapCreate
HeapValidate
HeapSize
LockFileEx
GetDiskFreeSpaceW
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
OutputDebugStringA
GetVersionExA
GetTempPathA
AreFileApisANSI
DeleteFileA
SetNamedPipeHandleState
ExitProcess
GetStringTypeW
EncodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleHandleExW
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
GetACP
RtlUnwindEx
RtlPcToFileHeader
RtlLookupFunctionEntry
GetCPInfo
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
CompareStringW
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetOEMCP
GetFileType
GetConsoleCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReadConsoleW
GetTimeZoneInformation
SetStdHandle
WriteConsoleW
SetEnvironmentVariableW
SetEnvironmentVariableA
lstrlenA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ