Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
3Static
static
1HkFxMgr64.zip
windows7-x64
1HkFxMgr64.zip
windows10-1703-x64
1HkFxMgr64.zip
windows10-2004-x64
1Device/Har...64.dll
windows7-x64
1Device/Har...64.dll
windows10-1703-x64
3Device/Har...64.dll
windows10-2004-x64
3manifest.json
windows7-x64
3manifest.json
windows10-1703-x64
3manifest.json
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
HkFxMgr64.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
HkFxMgr64.zip
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
HkFxMgr64.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
Device/HarddiskVolume2/Program Files (x86)/ProductivityBoss_e5/bar/1.bin/HkFxMgr64.dll
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
Device/HarddiskVolume2/Program Files (x86)/ProductivityBoss_e5/bar/1.bin/HkFxMgr64.dll
Resource
win10-20230703-en
Behavioral task
behavioral6
Sample
Device/HarddiskVolume2/Program Files (x86)/ProductivityBoss_e5/bar/1.bin/HkFxMgr64.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
manifest.json
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
manifest.json
Resource
win10-20230703-en
Behavioral task
behavioral9
Sample
manifest.json
Resource
win10v2004-20230703-en
Target
HkFxMgr64.dll
Size
189KB
MD5
8faaf3fa84887dfe03a728b9f790085f
SHA1
65dfa09ffd7ca2375dcc0c334b505ad04bf7ab0e
SHA256
760c3783fae11d3b819143deabf6a1cf57b8b2d644565cb8a54577fac17e1536
SHA512
3b139e8d5da41904c98bd231377986dc980d1c01912bde3bb76e5cd673bd3f16c2181f86f0bb161f96ce4cb00b99799821c8ba029a3d9de012191414e9d9ae14
SSDEEP
3072:HvQCQnKQAo3XYhipZjm7eo9Or4mSEaSxUbBqdJ/S8zic93h8/NV8qM3:CA2raJ9Or4muSxljS8ziv/YP3
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
LocalFree
FormatMessageA
OutputDebugStringA
QueryPerformanceCounter
SetLastError
OutputDebugStringW
GetCurrentThreadId
SwitchToThread
GetFileAttributesW
CreateDirectoryW
TlsAlloc
TlsGetValue
TlsSetValue
CloseHandle
GetCurrentProcessId
GetCurrentProcess
GetPrivateProfileSectionW
CreateFileW
GetModuleHandleW
WriteFile
GetModuleHandleExW
VirtualQuery
VirtualProtect
LoadLibraryW
FreeLibrary
HeapFree
FlsSetValue
GetCommandLineA
RtlLookupFunctionEntry
RtlUnwindEx
HeapAlloc
RaiseException
RtlPcToFileHeader
LCMapStringW
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
VerSetConditionMask
RtlVirtualUnwind
RtlCaptureContext
HeapSize
ExitProcess
HeapSetInformation
GetVersion
HeapCreate
HeapDestroy
HeapReAlloc
GetStdHandle
GetLocaleInfoW
FlsGetValue
FlsFree
GetCurrentThread
FlsAlloc
SetHandleCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleW
FlushFileBuffers
GetProcessHeap
SetEvent
TlsFree
WaitForSingleObject
OpenEventA
CreateEventA
ResetEvent
VerifyVersionInfoW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrlenA
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
GetLastError
LocalAlloc
LoadLibraryA
GetThreadTimes
InitializeSListHead
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
OpenProcessToken
CoTaskMemFree
CoGetCurrentLogicalThreadId
PathFindFileNameW
UnloadUserProfile
HookedModules
ReapplyHooks
SetupForHooker
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ