Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
1838cd7331455732ee5855203cdac840N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1838cd7331455732ee5855203cdac840N.exe
Resource
win10v2004-20240802-en
Target
1838cd7331455732ee5855203cdac840N
Size
703KB
MD5
1838cd7331455732ee5855203cdac840
SHA1
4df1a4e560e584deb876beeddb67223dc611c8a5
SHA256
293ac5ad869ea86b5b58048f295905513c88017e65660a410985835f3a48a295
SHA512
49a1701ea550759e659570d2a86f3bdb877a7deb383aea8c7e59b2f82f6958933f62b8ceee0af5ec27599b54e5a48570872bfb1080ace2e75afa69d11e90b1c4
SSDEEP
12288:NGnVO3Lliq4DZ+p8RAoWPo6gCY5pEF0kF60Y/bM+21fB7R6iwbg7vmGFXl43Fajm:NGY3Lc3ZlAoWw6gtftkF6nbM+21p7R/c
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\smartloader\kernel_proj\trunk\kernel_smartloader\bin\ReleaseA\pdb\KernelPackage.pdb
SetEndOfFile
GetProcessTimes
GetCurrentProcess
FileTimeToLocalFileTime
CreateFileA
FreeResource
GetTempPathA
ReadFile
GetTickCount
GetPrivateProfileIntA
GetModuleHandleA
LoadResource
LockResource
SetLastError
SizeofResource
FindResourceA
OutputDebugStringA
GetFileAttributesA
MultiByteToWideChar
GetModuleFileNameA
WritePrivateProfileStringA
SetFilePointer
WriteFile
CloseHandle
CreateDirectoryA
FileTimeToSystemTime
SetFileTime
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
SetFileAttributesA
GetLastError
GetACP
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
GetVersionExA
GetLocaleInfoA
GetThreadLocale
IsWindow
PostMessageA
wsprintfA
SHCreateDirectoryExA
SHGetSpecialFolderPathA
CoCreateInstance
CoInitializeEx
SysFreeString
SysAllocString
SysStringLen
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@V?$_String_const_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@0@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
memcpy
__CxxFrameHandler3
??3@YAXPAX@Z
_access
_invalid_parameter_noinfo
_chmod
rename
fopen
fwrite
fclose
??_V@YAXPAX@Z
printf
_mbsrchr
__argc
__argv
_localtime64
atoi
strftime
_vsnprintf_s
_time64
_unlink
calloc
free
??2@YAPAXI@Z
malloc
_mbsstr
sprintf_s
strcpy_s
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
memset
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE