Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume4/USERS/jharrison/AppData/Local/Temp/RarSFX0/plugins/plugindata/kprocesshacker2_x64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume4/USERS/jharrison/AppData/Local/Temp/RarSFX0/plugins/plugindata/kprocesshacker2_x64.exe
Resource
win10v2004-20230221-en
Target
MDDB01_2023-03-13_07_42_30.zip
Size
20KB
MD5
33e232c2e858dfd24ca98bc45b50f2f1
SHA1
b0e89f01364f1e642860d508390432023e6ec135
SHA256
af6a9728052f1f779bf12313d75decb9f133c9b25ff06eb9fc84b4461079716b
SHA512
f76f2f396955668cd01ea842e4687886b2476a81ca6b36cfa176381c5bcb8b7d967906d35ec24bef677436249668d8b521b83940b9a859a54a08385858ea3bb0
SSDEEP
384:NSGrKGBwW5170vnW2WSuXrirsvXvnp1QnwFjtwv0+eqw3Y:N3r6KxMdOUc/UwFjk4Y
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
ExAllocatePoolWithTag
ExFreePoolWithTag
RtlInitUnicodeString
IoDeleteDevice
ProbeForWrite
ZwQuerySystemInformation
ZwQueryValueKey
ZwClose
IofCompleteRequest
PsGetCurrentProcessId
IoCreateDevice
SePrivilegeCheck
ZwOpenKey
ProbeForRead
RtlGetVersion
RtlCompareMemory
MmGetSystemRoutineAddress
PsProcessType
ObOpenObjectByName
ZwQueryObject
RtlEqualUnicodeString
KeUnstackDetachProcess
ExEnumHandleTable
ObQueryNameString
IoFileObjectType
IoDriverObjectType
IoGetCurrentProcess
ObReferenceObjectByHandle
ObCloseHandle
PsInitialSystemProcess
ObSetHandleAttributes
ZwQueryInformationProcess
ObfDereferenceObject
ExAllocatePoolWithQuotaTag
ZwQueryInformationThread
ObOpenObjectByPointer
KeStackAttachProcess
ExAcquireRundownProtection
PsLookupProcessByProcessId
PsJobType
PsReferencePrimaryToken
SeTokenObjectType
ExReleaseRundownProtection
ZwSetInformationProcess
PsGetProcessJob
PsLookupProcessThreadByCid
ZwTerminateProcess
PsDereferencePrimaryToken
IoThreadToProcess
RtlWalkFrameChain
KeInitializeApc
KeSetEvent
KeInsertQueueApc
KeInitializeEvent
PsSetContextThread
PsGetThreadWin32Thread
ZwSetInformationThread
KeWaitForSingleObject
PsThreadType
PsAssignImpersonationToken
PsGetContextThread
PsLookupThreadByThreadId
MmUnmapLockedPages
ExRaiseStatus
MmHighestUserAddress
MmMapLockedPagesSpecifyCache
MmProbeAndLockPages
MmUnlockPages
MmIsAddressValid
KeBugCheckEx
__C_specific_handler
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ