Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
360sdToasts.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
360sdToasts.exe
Resource
win10v2004-20240419-en
Target
360sdToasts.exe
Size
221KB
MD5
4f87a229c63b4ec7ddae4190c9a5499a
SHA1
a2ad113d96f1cd533d51683834d29b93ef3d6b9c
SHA256
9b194c4ea2e07180329dc59ea70cfabc860a341615421a329063eaafa7893abc
SHA512
d9c400e6590f48f2dd47c66198cdde71fdd294a1c09f9654ac15bdada3728599c0d46653c226f186d72813f61ffc526dc899cd4130e7e389668fbf07fa90814c
SSDEEP
3072:2QE8LdyVu+ZvPS8969tY+aI019WTa3pCov0wLmS+fQih+MIP3LV3nkHUL5Z:2QE8LdyVu+ZvPS/PTmpvjLmS+fQO0JL3
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\x64\360sdToasts.pdb
RoUninitialize
RoGetActivationFactory
RoInitialize
WindowsCreateStringReference
WindowsDeleteString
PathAppendW
PathFileExistsW
StrStrIW
StrCmpNIW
StrStrW
SHStrDupW
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetWindowsDirectoryW
DeleteFileW
GetModuleFileNameW
CreateFileW
GetFileSize
ReadFile
CloseHandle
WriteFile
WideCharToMultiByte
GetCurrentProcessId
ReleaseMutex
GetLastError
GetCurrentProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
FreeLibrary
MultiByteToWideChar
GetACP
OpenThread
WaitForSingleObject
CreateProcessW
CreateMutexW
SystemTimeToFileTime
Sleep
TerminateProcess
GetCommandLineW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
DeviceIoControl
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetEnvironmentVariableW
GetFileAttributesW
RaiseException
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
FlushFileBuffers
GetTickCount64
QueryPerformanceCounter
InitOnceExecuteOnce
InitializeCriticalSectionAndSpinCount
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
SetLastError
GetCPInfo
GetOEMCP
IsValidCodePage
GetStartupInfoW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
LCMapStringEx
LoadLibraryExW
OutputDebugStringW
SetStdHandle
WriteConsoleW
TlsAlloc
FindAtomW
DeleteAtom
TlsFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
RtlUnwindEx
RtlLookupFunctionEntry
AddAtomW
GetAtomNameW
TlsSetValue
TlsGetValue
GetSystemTime
RtlPcToFileHeader
GetSystemTimeAsFileTime
DecodePointer
LocalFree
FormatMessageW
GetFileSizeEx
LocalFileTimeToFileTime
CreateFileA
ReadConsoleW
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
PostThreadMessageW
GetMessageW
TranslateMessage
DispatchMessageW
LoadCursorW
CreateWindowExW
RegEnumKeyExW
RegQueryValueExA
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
PropVariantClear
CoCreateInstance
CoInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ