Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
fj74ejf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fj74ejf.exe
Resource
win10v2004-20230220-en
Target
fj74ejf.png
Size
560KB
MD5
dddcd3fa80ca9b4889d774c9a43a48c4
SHA1
4206b03080d58acfa41339b25270f59a48642e53
SHA256
e1d0e92606aac8ff32c501ba9a8b163a304cd7c16beadc5d91fd0c8ad12e5055
SHA512
d56bb8d62587596616f02ffb4b2929461fea448c5cfb57d512c24997f2e8cadda7d1efe3b75d7242dc7210cec3e8a297dc24f8adba81f170ccb5337300aeec33
SSDEEP
6144:e1NQDI/hHSCmoaLyO3q+CYcrl6tmPV0GoJ0DAO1XwER0u+GIIIIIIIhIIIIIIII2:e126HSCmoaLyOa+Yrl5DHLm5BK27Jv/M
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
HeapAlloc
GetProcessHeap
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleExA
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringW
CloseHandle
CreateEventA
Sleep
GetTickCount
GetModuleFileNameW
LCMapStringEx
InitializeCriticalSectionEx
WriteConsoleW
DecodePointer
GetConsoleOutputCP
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
ReadConsoleW
GetConsoleMode
SetStdHandle
MultiByteToWideChar
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleExW
ExitProcess
GetStdHandle
GetFileType
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
ReadFile
GetCurrentProcess
WriteFile
RegisterWaitForSingleObject
UnregisterWait
CreateNamedPipeW
InitializeCriticalSection
CreateMutexW
ReleaseMutex
DuplicateHandle
DisconnectNamedPipe
CreateEventW
GetLastError
SetEvent
ResetEvent
GetOverlappedResult
UnregisterWaitEx
DeleteCriticalSection
GetCurrentProcessId
ConnectNamedPipe
OpenProcess
ReadProcessMemory
GetSystemTimeAsFileTime
GetProcessTimes
CreateFileW
LoadLibraryW
GetProcAddress
FreeLibrary
GetSystemTime
CreateDirectoryW
DeleteFileW
FindClose
FindFirstFileExW
FindNextFileW
FlushFileBuffers
GetFileAttributesW
GetFileSizeEx
GetFileTime
SetEndOfFile
SetFileAttributesW
SetLastError
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
GetModuleHandleW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
TerminateProcess
RtlUnwind
RaiseException
EncodePointer
TlsAlloc
WriteMiniDump
Plat_IsInDebugSession
Plat_ExitProcess
?AssertFailed@?$AssertMsgHelper@$00@@SA_NPBDI0@Z
getcwd_utf8
??1CThreadMutex@@QAE@XZ
??0CThreadMutex@@QAE@XZ
g_dwDllEntryThreadId
g_pMemAllocSteam
?AssertFailed@?$AssertMsgHelper@$0A@@@SA_NPBDI0ZZ
?Push@CValidator@@QAEXPBDPAX0@Z
?Pop@CValidator@@QAEXXZ
?ClaimArrayMemory@CValidator@@QAEXPBX@Z
V_snprintf
V_vsnwprintf
V_strncat
V_UTF8ToUTF16
V_UTF16ToUTF8
V_StripTrailingSlash
V_StripLastDir
V_FixSlashes
V_strncpy
V_strncat_length
V_RemoveDotSlashes
V_IsAbsolutePath
V_FixDoubleSlashes
EnumProcessModules
GetModuleBaseNameW
InternetQueryDataAvailable
InternetOpenW
HttpQueryInfoW
InternetCrackUrlW
HttpSendRequestW
HttpAddRequestHeadersW
InternetReadFile
HttpOpenRequestW
InternetConnectW
InternetCloseHandle
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ