Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
5cd984166e3e176d02d7511090e101f7b3f85dd59167d5f0909568d42bb8bfe3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5cd984166e3e176d02d7511090e101f7b3f85dd59167d5f0909568d42bb8bfe3.exe
Resource
win10v2004-20240226-en
Target
5cd984166e3e176d02d7511090e101f7b3f85dd59167d5f0909568d42bb8bfe3
Size
409KB
MD5
4a6ab6877f4598c37e873beef0720f9d
SHA1
7149473db01fc00a7bf3628678343ebe2bfbe563
SHA256
5cd984166e3e176d02d7511090e101f7b3f85dd59167d5f0909568d42bb8bfe3
SHA512
1429a0f00dc2998083515786c47beff089e5bbc9938595cb73dc33f760f5ee064d256c186db01eaf00da28178498060efb4b7d76c0883dc75da6b57284b46a7e
SSDEEP
12288:dp5jy7Ntd+vszAlogMTycgQbS753HVK09Y:dpZy7Ntd+vszAlozTyDUS75X1Y
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\ReleaseAI\win\Release\custact\x86\viewer.pdb
ord224
CertFreeCertificateContext
CertGetNameStringW
FindResourceExW
CreateFileW
CloseHandle
FindClose
DeleteFileW
FindNextFileW
GetFileAttributesW
CreateDirectoryW
WriteFile
SetFilePointer
GetModuleHandleW
GetWindowsDirectoryW
GetTempPathW
GetTempFileNameW
MoveFileW
GetCurrentProcess
GetSystemDirectoryW
LoadLibraryExW
CreateToolhelp32Snapshot
HeapFree
OpenProcess
Process32NextW
GetProcessTimes
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
LoadResource
ReadProcessMemory
Sleep
SetLastError
ExitProcess
lstrcmpiW
GetModuleFileNameW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringW
GetCurrentThreadId
FlushFileBuffers
GetStringTypeW
InitializeCriticalSectionEx
DecodePointer
GetCommandLineW
GetStartupInfoW
WriteConsoleW
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapReAlloc
HeapSize
HeapDestroy
IsProcessorFeaturePresent
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
GetProcAddress
LoadLibraryW
LocalAlloc
GetLastError
LocalFree
FindResourceW
SizeofResource
LockResource
GetProcessHeap
TerminateProcess
HeapAlloc
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
Process32FirstW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SleepConditionVariableSRW
WakeAllConditionVariable
GetFileType
GetStdHandle
GetModuleHandleExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
RaiseException
FormatMessageA
GetLocaleInfoEx
EncodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
RtlUnwind
GetWindowLongW
AllowSetForegroundWindow
GetForegroundWindow
GetWindowThreadProcessId
EnumWindows
SetWindowPos
SetSecurityDescriptorDacl
RegQueryValueExW
RegOpenKeyExW
ConvertSidToStringSidW
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
LookupAccountSidW
InitializeSecurityDescriptor
SetEntriesInAclW
GetSecurityDescriptorDacl
ShellExecuteExW
ShellExecuteW
CoCreateInstance
CoAllowSetForegroundWindow
CoUninitialize
CoInitialize
VariantInit
SysAllocString
SysFreeString
VariantClear
PathIsUNCW
PathFileExistsW
ord176
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ