Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
fb3c77488612d7436530f52c828ce29c5336a6556b93781d622e6370dfa29084.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb3c77488612d7436530f52c828ce29c5336a6556b93781d622e6370dfa29084.exe
Resource
win10v2004-20240226-en
Target
fb3c77488612d7436530f52c828ce29c5336a6556b93781d622e6370dfa29084
Size
516KB
MD5
63117c5d5c04afaa0cb5b194f9e1500b
SHA1
35c351679f4b45a9c53dbb944e60d452a6ec8f34
SHA256
fb3c77488612d7436530f52c828ce29c5336a6556b93781d622e6370dfa29084
SHA512
e3bb35fcd4778aa0c135f3617206f6c956994aa9924f2bd146bf7f9bf70afb0c6059aef233a60c9ce11634fe47ad3caf93730e58167fce4c6ac31d08dff06024
SSDEEP
12288:Lq7kYyGRx0v9uUv8dJfYsDw6OpTTQO9jMb:mwYzRx01dv8dJf7DwHp3QO9jMb
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\bld\nview\v146\nview\bin\x64\Release\nvTaskBar.pdb
EnumProcessModules
GetModuleBaseNameW
GetTickCount
lstrcmpiW
CreateSemaphoreW
lstrlenW
lstrcmpW
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
MultiByteToWideChar
CloseHandle
WaitForSingleObject
CreateEventW
GetProcAddress
GetModuleHandleW
VerifyVersionInfoW
GetFullPathNameW
ExpandEnvironmentStringsW
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
CreateFileA
ReadFile
GetProcessHeap
SetEndOfFile
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetTimeFormatA
GetDateFormatA
GetStringTypeW
GetStringTypeA
HeapReAlloc
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateFileW
SetStdHandle
SetFilePointer
GetLocaleInfoA
GetLocaleInfoW
LCMapStringW
LCMapStringA
IsValidCodePage
LoadLibraryExW
lstrcmpA
ExpandEnvironmentStringsA
GetSystemDirectoryW
VirtualFreeEx
Sleep
WinExec
VerSetConditionMask
CreateProcessW
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
HeapSize
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
QueryPerformanceCounter
LocalAlloc
LocalFree
FreeLibrary
GetLastError
LoadLibraryA
RaiseException
FormatMessageW
GetModuleFileNameW
GetTempPathW
GetCurrentProcessId
OutputDebugStringW
CreateMutexW
GetCurrentThreadId
AcquireSRWLockExclusive
AcquireSRWLockShared
ReleaseSRWLockExclusive
ReleaseSRWLockShared
FindClose
FindFirstFileW
GetWindowsDirectoryW
GetUserDefaultUILanguage
LockResource
SizeofResource
LoadResource
FindResourceW
GetFileAttributesW
GetVersionExW
ReleaseMutex
IsWow64Process
GetCurrentProcess
GetCurrentThread
RtlPcToFileHeader
CreateProcessA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
ExitProcess
GetCommandLineA
GetStartupInfoA
GetLocalTime
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapFree
EncodePointer
DecodePointer
TlsAlloc
FlsGetValue
FlsSetValue
FlsFree
SetLastError
FlsAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
FatalAppExitA
SetConsoleCtrlHandler
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapSetInformation
HeapCreate
HeapDestroy
InvalidateRect
GetClientRect
RedrawWindow
InflateRect
FillRect
EnumWindows
GetWindowPlacement
IntersectRect
GetMonitorInfoW
CopyIcon
GetClassLongPtrW
IsIconic
GetWindow
PostQuitMessage
UnregisterClassW
MonitorFromPoint
EnumDisplayDevicesW
EnumDisplaySettingsW
EqualRect
DeregisterShellHookWindow
RegisterWindowMessageW
RegisterShellHookWindow
GetMessageW
TranslateMessage
DispatchMessageW
PostMessageW
IsWindowVisible
UpdateWindow
SystemParametersInfoW
LoadBitmapW
DialogBoxParamW
LoadMenuIndirectW
LoadStringW
EndPaint
GetWindowLongW
BeginPaint
SetDlgItemTextW
SetFocus
SetWindowTextW
GetSystemMetrics
DrawTextW
EndDialog
GetDlgItem
GetDlgCtrlID
MoveWindow
IsHungAppWindow
IsRectEmpty
wsprintfW
GetClassNameW
GetSysColor
ScreenToClient
InsertMenuItemW
GetMenuItemInfoW
SetMenuItemInfoW
GetDC
ReleaseDC
CreatePopupMenu
GetParent
GetWindowThreadProcessId
FindWindowExW
SetForegroundWindow
GetForegroundWindow
ClientToScreen
PtInRect
GetWindowTextW
DestroyIcon
KillTimer
GetClassInfoExW
LoadIconW
LoadCursorW
GetSysColorBrush
LoadImageW
RegisterClassExW
RegisterClassW
DefWindowProcW
GetWindowLongPtrW
CreateWindowExW
GetCursorPos
LoadMenuW
TrackPopupMenu
DestroyMenu
SetWindowLongPtrW
DestroyWindow
GetSubMenu
CheckMenuItem
CascadeWindows
TileWindows
FindWindowW
ShowWindow
SendMessageW
GetWindowRect
SetTimer
SetWindowPos
DeleteObject
GetDeviceCaps
CreateSolidBrush
DeleteDC
StretchBlt
GetObjectW
CreateCompatibleDC
SelectObject
CreateFontIndirectW
GetStockObject
SetBkMode
BitBlt
GetSecurityDescriptorSacl
RegNotifyChangeKeyValue
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
DeregisterEventSource
ReportEventW
RegisterEventSourceW
RegCreateKeyExW
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
AllocateAndInitializeSid
RegOpenCurrentUser
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
AddAccessAllowedAce
InitializeAcl
GetLengthSid
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
CreateWellKnownSid
CheckTokenMembership
GetTokenInformation
RegSetKeySecurity
RegEnumKeyExW
ImpersonateSelf
OpenThreadToken
SHAppBarMessage
ShellExecuteW
CoInitialize
CoUninitialize
CoCreateInstance
SHDeleteKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ