Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
bbc5851a85e0ee684379868c171d28e3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbc5851a85e0ee684379868c171d28e3.exe
Resource
win10v2004-20240226-en
Target
bbc5851a85e0ee684379868c171d28e3
Size
286KB
MD5
bbc5851a85e0ee684379868c171d28e3
SHA1
65eb3673b933804237848796274010dcea8ba185
SHA256
c829603ab4fbfcff2d1c29f024a558b082e42e0c8b4cb35f26af8afe515e14e9
SHA512
2dca5619d4fd843dae6fc30e3aff9bc0d77428f41e0bb843ecf0cbec39593ae854316e8c8d552d0fe3a9388de7fca7e8b5851729151441ede156c8f3d101398c
SSDEEP
3072:XdHIfAHkKZ4sgehtZTWnz3gVrUHJdyln:dWAHkB8A8AH3U
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\work\360tray\branches\360Metro_Toasts\Release\360Toasts.pdb
RoUninitialize
RoGetActivationFactory
RoInitialize
WindowsDeleteString
WindowsCreateStringReference
PathRemoveFileSpecW
PathAppendW
PathFileExistsW
SHStrDupW
PathCombineW
StrStrW
GetConsoleMode
GetConsoleCP
LCMapStringEx
CreateFileW
CloseHandle
GetCurrentProcessId
GetModuleHandleW
GetModuleFileNameW
LoadLibraryW
FreeLibrary
DeleteCriticalSection
InitializeCriticalSection
OutputDebugStringW
LeaveCriticalSection
GetProcAddress
EnterCriticalSection
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
FlushFileBuffers
SetStdHandle
Process32NextW
OpenProcess
K32GetModuleFileNameExW
lstrlenW
RaiseException
GetStringTypeW
WideCharToMultiByte
RtlUnwind
LoadLibraryExW
Sleep
HeapSize
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
Process32FirstW
WriteConsoleW
TerminateProcess
GetCurrentProcess
FlsFree
ReadConsoleW
CreateToolhelp32Snapshot
GetSystemTimeAsFileTime
SetFilePointerEx
WriteFile
ReadFile
MultiByteToWideChar
GetLastError
SetLastError
CreateMutexW
HeapAlloc
HeapFree
WaitForSingleObject
GetProcessHeap
GetAtomNameW
AddAtomW
ReleaseMutex
TlsAlloc
FindAtomW
DeleteAtom
TlsFree
GetCommandLineW
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
HeapReAlloc
ExitProcess
GetModuleHandleExW
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
InitOnceExecuteOnce
GetStartupInfoW
QueryPerformanceCounter
GetTickCount64
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
TranslateMessage
GetMessageW
GetDesktopWindow
DispatchMessageW
FindWindowW
PostThreadMessageW
MonitorFromWindow
ShellExecuteExW
SHGetSpecialFolderPathW
PropVariantClear
CoCreateInstance
CoInitialize
ImmDisableIME
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE