Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
d48eb539506aab956b9d4c0572b06651.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d48eb539506aab956b9d4c0572b06651.exe
Resource
win10v2004-20240226-en
Target
d48eb539506aab956b9d4c0572b06651
Size
159KB
MD5
d48eb539506aab956b9d4c0572b06651
SHA1
563a52ebf6c2096354df8d9dc7b4e846a37a92cd
SHA256
203022c055a295c0ed9d478a59b170457f075ed7d8e57fad166b40b1d346d1e5
SHA512
32953492c155763f0afc5f1cdf717c95dc99cde67b0021ad1dc03a2ff5e371d9d8f2a63cdf19c30f4b26e4064c5db2abdcdf7f33fe27f447cc11d3a0a68315bb
SSDEEP
3072:rSSo/ZdaDxieXE0uXLv4KA1wwuuXpYnH:rSSo/ZKweXE0Qs9zTXpi
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Jenkins\workspace\TOOLBAR_PACKAGE\DEFENSE_SRC\IDC\Release\IdcLdr.pdb
WTSFreeMemory
WTSEnumerateProcessesW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
CreateFileW
GetProcAddress
GetModuleHandleW
GetTempFileNameW
DeleteFileW
OpenProcess
ProcessIdToSessionId
GetCurrentProcessId
LoadLibraryW
GetModuleFileNameW
FreeLibrary
GetFileTime
CompareFileTime
FindFirstFileW
FindClose
CreateMutexW
MoveFileExW
ReleaseMutex
ResetEvent
RaiseException
GetConsoleMode
GetConsoleCP
SetFilePointer
CreateEventW
UnmapViewOfFile
OpenFileMappingW
MapViewOfFileEx
CreateFileMappingW
CloseHandle
LocalFree
RtlUnwind
GetSystemTimeAsFileTime
GetTickCount
GetFileType
SetHandleCount
CopyFileW
WaitForSingleObject
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLastError
SetStdHandle
WriteConsoleW
SetEvent
FlushFileBuffers
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
ExitProcess
WriteFile
GetStdHandle
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetStringTypeW
LCMapStringW
IsProcessorFeaturePresent
Sleep
QueryPerformanceCounter
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
MsgWaitForMultipleObjects
UnhookWindowsHookEx
SetWindowsHookExW
GetWindowThreadProcessId
FindWindowW
SetNamedSecurityInfoW
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
InitializeSecurityDescriptor
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
ord165
SHGetFolderPathW
ShellExecuteExW
GetAdaptersInfo
GetModuleFileNameExW
CryptMsgGetParam
CertFindCertificateInStore
CryptQueryObject
CertGetNameStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE