Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
nigger2.exe
Resource
win10-20240214-en
Target
nigger2.exe
Size
22KB
MD5
b178f9b458909035aebd6abe79da5efa
SHA1
0b79d74218b704ff1bffe7db501b837d42903f45
SHA256
422a65c41497d018e74ba47f3e146730a1c519d80b8bf5d88eaf62635057b0ea
SHA512
7bbf563c149da15788c74fa7ff88483ca9f6275ccaf0b16bd309805113b19c462ee8649c8f7eb574843da2ca83d19ead300136953ec2aa1a4993efb9f1fc5e93
SSDEEP
384:74XBJcCCt/pJbKbC+RKCSgQYNN35ejDZzGYJLWYwbqoro:kRJcLdvkCZkL3A3Zz/LKbTE
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\SrcTree\sonic3\release\forge\10.0\errorreport\Minidump\obj-x86\CreateMinidumpx86.pdb
MiniDumpWriteDump
GetSystemTimeAsFileTime
GetCurrentProcessId
DeleteFileW
CloseHandle
CreateFileW
GetLastError
OpenProcess
GetCommandLineW
WaitForSingleObject
CreateProcessW
TerminateProcess
GetModuleFileNameW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetFileSize
OpenFileMappingW
Sleep
GetExitCodeProcess
SetFilePointer
ReadFile
GetFileTime
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
Thread32Next
ResumeThread
SuspendThread
OpenThread
Thread32First
SetEvent
OpenEventW
GetCurrentThreadId
GetTickCount
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentProcess
MessageBoxW
wcscat_s
??_U@YAPAXI@Z
??2@YAPAXI@Z
??_V@YAXPAX@Z
??3@YAXPAX@Z
__CxxFrameHandler3
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
memset
malloc
_snwprintf_s
wcsrchr
wcscpy_s
_wtoi
_wcsicmp
_wcsnicmp
CommandLineToArgvW
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ