Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
cd19336de2dc877271a22248589924df.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd19336de2dc877271a22248589924df.exe
Resource
win10v2004-20240226-en
Target
cd19336de2dc877271a22248589924df
Size
379KB
MD5
cd19336de2dc877271a22248589924df
SHA1
8de2135b268a0d4ce954ef285a88d1c4c26a9636
SHA256
11a797779052b41d266ffbc4676096f986ef978eb33587c0107126e038560a7d
SHA512
bc8387d49720d8702f870b9a707486238717519156b4c67795302a30a77937f7e24944bf2bd8b26090d5646b987825e51ff3616e64be140a99480dc32bde76fa
SSDEEP
6144:vsYQXsnUVx4ZXvQShdrXvbGLcqBG65tufv1Qp9A2+94juR1y93kY:vjndvQSrrXvbGIqBGr1m+91
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
F:\CB\ARM\BuildResults\bin\Win32\Release\AdobeARMHelper.pdb
EnumProcesses
EnumProcessModules
GetModuleFileNameExW
GetModuleBaseNameW
ord141
ord160
ord131
ord70
ord159
ord16
ord92
ord8
ord118
ord32
ord88
ord205
CreateEnvironmentBlock
DestroyEnvironmentBlock
UnloadUserProfile
FindFirstFileW
SetFilePointer
lstrcmpW
FindClose
LocalAlloc
MoveFileW
WideCharToMultiByte
FindNextFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
lstrcmpA
LoadLibraryW
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationW
GetFullPathNameW
GetModuleFileNameW
InterlockedDecrement
FreeLibrary
lstrlenA
GetCurrentProcessId
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
CompareStringW
GetFileSizeEx
GetFileTime
GlobalFlags
GetCurrentThreadId
GlobalAddAtomW
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
InterlockedExchange
CompareStringA
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
HeapReAlloc
RaiseException
SetStdHandle
GetFileType
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
VirtualFree
VirtualAlloc
GetStdHandle
GetModuleFileNameA
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetCurrentDirectoryA
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
CreateThread
SetFileAttributesW
LocalFree
GetWindowsDirectoryW
CreateToolhelp32Snapshot
Process32NextW
RemoveDirectoryW
LockResource
Process32FirstW
GetProcAddress
SetLastError
GetLongPathNameW
GetTempPathW
MultiByteToWideChar
ReadFile
GetExitCodeProcess
GetVersionExW
FormatMessageW
SizeofResource
CopyFileW
Sleep
OpenProcess
GetProcessHeap
GetCurrentThread
GetModuleHandleW
WaitForSingleObject
HeapFree
GetCurrentProcess
HeapAlloc
CreateProcessW
LoadResource
FindResourceW
GetPrivateProfileStringW
WritePrivateProfileStringW
DeleteFileW
GetFileAttributesW
lstrlenW
CloseHandle
WriteFile
GetLastError
CreateFileW
RemovePropW
GetPropW
SetPropW
GetClassLongW
GetCapture
WinHelpW
LoadIconW
RegisterWindowMessageW
CheckMenuItem
EnableMenuItem
ModifyMenuW
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
PostQuitMessage
DestroyMenu
GetClientRect
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
DefWindowProcW
CallWindowProcW
CopyRect
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
GetKeyState
PeekMessageW
ValidateRect
SetWindowPos
SetWindowLongW
IsWindow
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
LoadCursorW
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetWindowTextW
UnhookWindowsHookEx
CharUpperW
GetSystemMetrics
GetMenuState
GetMenuItemID
MessageBoxW
GetForegroundWindow
SetWindowTextW
GetDlgItem
GetMenuItemCount
GetSubMenu
FindWindowW
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetDC
CryptHashData
ConvertSidToStringSidW
CryptDestroyHash
CryptCreateHash
GetNamedSecurityInfoW
SetNamedSecurityInfoW
RegDeleteKeyW
CryptReleaseContext
CryptAcquireContextW
CryptGetHashParam
RegSetValueExW
RegCloseKey
CheckTokenMembership
GetLengthSid
InitializeSid
GetSidLengthRequired
RegOpenKeyExW
IsValidSid
RegEnumValueW
RegDeleteValueW
DuplicateTokenEx
LookupAccountSidW
RegQueryInfoKeyW
DuplicateToken
CreateProcessAsUserW
RegQueryValueExW
RegCreateKeyExW
CopySid
GetTokenInformation
RegCreateKeyW
OpenThreadToken
GetSidSubAuthority
OpenProcessToken
SHChangeNotify
SHGetFolderPathW
SHCreateDirectoryExW
ShellExecuteW
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
PathIsUNCW
PathFindFileNameW
PathStripToRootW
CertFreeCertificateContext
CertGetNameStringW
CertCloseStore
CryptDecodeObject
CryptMsgClose
CryptMsgGetParam
CryptQueryObject
CertFindCertificateInStore
WinVerifyTrust
LresultFromObject
CreateStdAccessibleObject
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
PtVisible
RectVisible
TextOutW
ExtTextOutW
GetDeviceCaps
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
DocumentPropertiesW
OpenPrinterW
ClosePrinter
GetFileTitleW
VariantInit
VariantClear
VariantChangeType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE