Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
tmulvhhft.dll
Resource
win7-20230220-en
Target
tmulvhhft.def
Size
7.9MB
MD5
ca1c1e010e7ddac258e9dee2625a9657
SHA1
8c674aa81dd1e0ef523516b248682ff1c67c938b
SHA256
a41d5274599dfe60823b477ea0dc20b9c8e9b398d8b287701f8cb02ea605ad84
SHA512
19cea2ce1f1ec136b248cedd8045efdc2b94d59c6b1c01cd52179555dbdcbb3d39e135cdff7db7ba6a0e29546a41907c1f5b9cf159e0261f5ce1fa6f8c2d5642
SSDEEP
98304:0MhrN1tEkygPgPzSWOC0cq8owkp2+ngw2twGzTnVYv9f8nVOl/3Gph8Sxa/L6Iuy:XDQOCIgJnswLEgv32I/gX
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
OpenProcessToken
RegCloseKey
RevertToSelf
SetSecurityDescriptorDacl
ImpersonateLoggedOnUser
RegQueryValueExW
RegOpenKeyExW
InitializeSecurityDescriptor
GetAdaptersInfo
NotifyAddrChange
FindResourceW
SetThreadLocale
CreateNamedPipeW
WaitForMultipleObjectsEx
LockResource
DeleteFileW
IsProcessorFeaturePresent
SetWaitableTimer
EnterCriticalSection
IsDebuggerPresent
GetCurrentThreadId
CreateEventW
SetConsoleCtrlHandler
LeaveCriticalSection
ResumeThread
WideCharToMultiByte
OutputDebugStringA
HeapFree
SetEndOfFile
GetModuleHandleW
GetModuleFileNameA
Sleep
TerminateProcess
WaitForMultipleObjects
OpenThread
DisconnectNamedPipe
WaitForSingleObject
IsBadWritePtr
QueueUserAPC
WTSGetActiveConsoleSessionId
CreateTimerQueueTimer
UnmapViewOfFile
FindResourceExW
GetLocaleInfoW
LoadLibraryW
SetUnhandledExceptionFilter
SetEvent
GetProcAddress
GetModuleFileNameW
CreateFileW
SetThreadPriority
OutputDebugStringW
MapViewOfFile
GetCommandLineW
GetTempPathW
LocalFree
SetFilePointer
GetUserDefaultUILanguage
OpenProcess
DeleteCriticalSection
LoadResource
GetLocalTime
SizeofResource
InterlockedIncrement
GetTimeFormatA
QueryPerformanceCounter
GetSystemTime
VirtualProtect
InitializeCriticalSectionAndSpinCount
InitializeCriticalSection
OpenMutexW
InterlockedDecrement
GetTickCount
GetModuleHandleA
GetProcessHeap
GetFileSize
GetCurrentThread
ReadFile
CreateThread
GetVersion
ProcessIdToSessionId
GetACP
GetCurrentProcessId
CancelWaitableTimer
CreateWaitableTimerW
HeapAlloc
CreateMutexW
GetComputerNameW
ConnectNamedPipe
GetTimeZoneInformation
CreateFileMappingW
ResetEvent
GetLastError
TerminateThread
MultiByteToWideChar
CloseHandle
WriteFile
DeviceIoControl
DeleteTimerQueueTimer
ReleaseMutex
FindResourceA
GetTempFileNameW
GetOverlappedResult
CancelIo
SleepEx
CLSIDFromProgID
CoUninitialize
CoInitialize
CoInitializeEx
CoCreateInstance
ShellExecuteExW
StrStrIA
LoadStringW
wsprintfA
GetWindowThreadProcessId
FindWindowW
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
WSAIoctl
WSASetEvent
WSAWaitForMultipleEvents
WSAResetEvent
WSAAccept
WSAEventSelect
WSACreateEvent
WSAEnumNetworkEvents
Pronate
Divisionism
Benzophenothiazine
Stronghearted
Hyposphene
Strategian
Pampinocele
Overfanciful
Backbiter
Undergarment
Reduced
Worsening
Unweel
Aldoketene
Pogonion
Brainlike
Monotonical
Tinglingly
Phlebosclerosis
Bechtler
Combust
Navew
Sparagus
Chasmed
DllUnregisterServer
Unifacial
Squarer
Dicranterian
Tripinnate
Iridodiagnosis
Hereticalness
Axhead
Phenocryst
Emotively
Apiaca
Unprisoned
DllRegisterServer
Bovinely
Linamarin
Evangelary
Novendial
Idiotically
Cordwainer
Alphecca
Unclerkly
Vibrissae
Queery
Proinvestment
Godforsaken
Aira
Galenic
Dateless
Herbose
Turbiniform
Endemiology
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ