Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
0fe62522462e4138c0d20a76e28b19e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0fe62522462e4138c0d20a76e28b19e0N.exe
Resource
win10v2004-20240802-en
Target
0fe62522462e4138c0d20a76e28b19e0N.exe
Size
941KB
MD5
0fe62522462e4138c0d20a76e28b19e0
SHA1
84d2241000b75bfd96860c0800af920af77d4a2d
SHA256
814b404a46df980c10f67e0777d6bd754e9cae530ca905efaeb4797a8f9a34ad
SHA512
6442e50900a580592529073692435ae685e6ba798de43b0bcaaa0f5662c67a5d219b1833b220ea44a5f12190b0450d06797be6d0eeb21bf7f53f8b26854707c7
SSDEEP
12288:ish7cjBXCovuZVv09vQuWEWVMSSs/v/14PURgrNGRAMh:Lh7cjR1vB95W7y2UUihEAC
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\Code\Repos\AutoDarkMode\Windows-Auto-Night-Mode\adm-updater-rs\target\release\deps\adm_updater_rs.pdb
LsaEnumerateLogonSessions
LsaGetLogonSessionData
LsaFreeReturnBuffer
InitializeSListHead
RtlVirtualUnwind
TlsFree
CloseHandle
AttachConsole
WaitNamedPipeW
SetNamedPipeHandleState
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
SystemTimeToFileTime
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
LoadLibraryExW
GetProcAddress
FreeLibrary
lstrlenW
LocalFree
GetCurrentProcess
QueryPerformanceCounter
CancelIoEx
CreateEventW
CreateNamedPipeW
WaitForSingleObject
GetOverlappedResult
ReadFile
WriteFile
CreateFileW
GetLastError
GetProcessHeap
HeapAlloc
HeapFree
LoadLibraryA
FormatMessageW
GetCurrentProcessId
GetTickCount64
GlobalMemoryStatusEx
GetLogicalDrives
GetDiskFreeSpaceExW
GetProcessTimes
GetExitCodeProcess
OpenProcess
GetSystemTimes
GetProcessIoCounters
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
GetDriveTypeW
GetVolumeInformationW
DeviceIoControl
SleepConditionVariableSRW
TryAcquireSRWLockExclusive
FreeEnvironmentStringsW
ReleaseMutex
FindClose
ReleaseSRWLockShared
CompareStringOrdinal
AddVectoredExceptionHandler
SetThreadStackGuarantee
SwitchToThread
Sleep
GetCurrentThread
RtlCaptureContext
RtlLookupFunctionEntry
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetCommandLineW
SetFileInformationByHandle
DuplicateHandle
GetStdHandle
WriteFileEx
SleepEx
ReadFileEx
TerminateProcess
WakeAllConditionVariable
WakeConditionVariable
QueryPerformanceFrequency
HeapReAlloc
AcquireSRWLockShared
WaitForSingleObjectEx
CreateMutexA
GetModuleHandleA
GetFileInformationByHandle
GetFileInformationByHandleEx
FindFirstFileW
MoveFileExW
CancelIo
GetConsoleMode
GetModuleHandleW
GetModuleFileNameW
SetCurrentDirectoryW
ExitProcess
GetFullPathNameW
WaitForMultipleObjects
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
MultiByteToWideChar
WriteConsoleW
CreateThread
TlsGetValue
TlsSetValue
GetSystemTimeAsFileTime
IsDebuggerPresent
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentThreadId
CommandLineToArgvW
SHGetKnownFolderPath
ShellExecuteW
GetTokenInformation
IsValidSid
ConvertSidToStringSidW
LookupAccountSidW
CopySid
SystemFunction036
OpenProcessToken
RegOpenKeyExW
RegSetValueExW
LookupAccountNameW
GetUserNameW
RegCloseKey
GetLengthSid
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
CoUninitialize
CoSetProxyBlanket
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CoInitializeSecurity
SysStringLen
GetErrorInfo
VariantClear
SysAllocString
SysFreeString
PdhOpenQueryA
PdhCloseQuery
PdhRemoveCounter
PdhGetFormattedCounterValue
PdhAddEnglishCounterW
PdhCollectQueryData
CallNtPowerInformation
GetPerformanceInfo
GetModuleFileNameExW
RtlGetVersion
NtQueryInformationProcess
NtQuerySystemInformation
NetApiBufferFree
NetUserEnum
NetUserGetLocalGroups
NetUserGetInfo
GetAdaptersAddresses
FreeMibTable
GetIfTable2
GetIfEntry2
BCryptGenRandom
__setusermatherr
wcslen
wcsncmp
strcpy_s
free
malloc
_set_new_mode
calloc
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
_set_app_type
_exit
__p___argc
_configure_narrow_argv
__p___argv
_cexit
abort
terminate
_c_exit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_register_thread_local_exe_atexit_callback
_seh_filter_exe
exit
__p__commode
_set_fmode
_configthreadlocale
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ