Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
pmls64.dll
Resource
win10v2004-20240226-en
Target
pmls64.dll
Size
925KB
MD5
6e6be26227f44e6dc5242b3196c9a3eb
SHA1
38f9b74cb7c880631f36707ab0cdce0ceef402e4
SHA256
565bf1d00bbbbebae9b03a09fe8f29636035e0612c0c5446333dd6d3142300f6
SHA512
d3f5bd6d0ddda5c9a816bc91a2e6f8c5c0b9e6a01d05aeb064031e914c68096b3ce5b1359374434e64f4205fcd36170924628f89c6954d0b69f01f845034f76b
SSDEEP
12288:BPhXWf1W3mWXyoClCF4l3kIEDMZ/9rulonWrnjwxgo:9hGtW3tXyoClCql3kIEO/cqnVp
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
d:\src\master\Client\OSMIMHK\x64\SmallStandalone\osmimhk64.pdb
socket
WSAIoctl
getsockname
WSAGetLastError
WSAAddressToStringA
htons
WSAStringToAddressA
freeaddrinfo
ntohl
inet_ntoa
send
gethostbyname
getsockopt
getpeername
ntohs
connect
getaddrinfo
recv
ObjectFromLresult
AccessibleObjectFromPoint
RetrieveUrlCacheEntryStreamA
ReadUrlCacheEntryStream
GetUrlCacheEntryInfoA
UnlockUrlCacheEntryStream
GetProcessImageFileNameA
GetModuleFileNameExA
EnumProcessModules
GetSystemTime
SetLastError
GetFileType
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
Sleep
SetEvent
WaitForSingleObject
FindClose
FindFirstFileA
GetCommandLineA
CreateProcessA
CreateMutexA
ResetEvent
CreateEventA
WaitForMultipleObjects
OpenProcess
OpenEventA
GetWindowsDirectoryA
GetCurrentDirectoryW
DuplicateHandle
ReadProcessMemory
GetBinaryTypeA
GlobalAlloc
QueryPerformanceCounter
GetModuleHandleExA
SetFilePointer
ReleaseMutex
OpenMutexA
GetVersionExA
WriteFile
CreateFileA
VirtualQueryEx
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
ResumeThread
GetCurrentThreadId
GetModuleHandleExW
VirtualProtect
VirtualQuery
VirtualFreeEx
GetExitCodeThread
CreateRemoteThread
SuspendThread
CreateProcessW
LeaveCriticalSection
EnterCriticalSection
ProcessIdToSessionId
GlobalFree
InitializeCriticalSection
GetBinaryTypeW
GetWindowsDirectoryW
LoadLibraryA
FreeLibrary
SystemTimeToFileTime
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
FlushInstructionCache
SetThreadContext
GetThreadContext
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
QueueUserWorkItem
GetTickCount
lstrlenA
GetLastError
MultiByteToWideChar
GetCurrentProcessId
CloseHandle
GetModuleHandleA
GetProcAddress
CreateFileW
SetEndOfFile
WriteConsoleW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LoadLibraryW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetStdHandle
GetCurrentThread
GetModuleFileNameA
lstrlenW
GetCurrentProcess
WideCharToMultiByte
GetStringTypeW
EncodePointer
DecodePointer
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
QueryPerformanceFrequency
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
SetHandleCount
ReadFile
HeapDestroy
HeapCreate
HeapSetInformation
ExitProcess
FormatMessageA
LoadLibraryExA
GetModuleFileNameW
GetSystemInfo
HeapFree
GetModuleHandleW
HeapSize
IsValidCodePage
GetOEMCP
GetACP
TerminateProcess
RtlCaptureContext
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FlsAlloc
FlsFree
FlsGetValue
GetLocaleInfoW
GetStdHandle
CompareStringW
GetCPInfo
LCMapStringW
FlsSetValue
HeapReAlloc
GetSystemTimeAsFileTime
CreateThread
ExitThread
TlsAlloc
CreateSemaphoreA
ReleaseSemaphore
LocalAlloc
LocalFree
GetVersion
HeapAlloc
GetProcessHeap
SetThreadStackGuarantee
GetTopWindow
GetAncestor
GetWindowThreadProcessId
SendMessageA
IsWindow
GetForegroundWindow
GetCursorPos
IsWindowVisible
GetWindow
FindWindowExA
GetWindowTextA
GetClassNameA
GetParent
LoadStringA
PostThreadMessageA
SendMessageTimeoutA
EnumChildWindows
CallNextHookEx
GetDesktopWindow
RegisterWindowMessageA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
TranslateMessage
DispatchMessageA
PostMessageA
EnumWindows
RegDeleteKeyA
CreateProcessAsUserA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
AllocateAndInitializeSid
GetSidSubAuthorityCount
GetSidSubAuthority
IsValidSid
CheckTokenMembership
FreeSid
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
InitializeAcl
SetSecurityInfo
GetTokenInformation
RegEnumKeyExA
CoCreateFreeThreadedMarshaler
CoInitialize
CoInitializeEx
CoUninitialize
CoUnmarshalInterface
CoCreateInstance
CreateStreamOnHGlobal
CoMarshalInterface
VariantClear
SysAllocString
VariantInit
SysFreeString
SysAllocStringLen
DispGetParam
SysStringLen
VariantChangeType
UuidCompare
UuidCreate
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
GetExtendedTcpTable
?Mine_PR_Read@@YAHPEAUPRFileDesc@@PEAXH@Z
?Mine_PR_Write@@YAHPEAUPRFileDesc@@PEBXH@Z
AddProxyInfo
CheckCapability
ClearProcID
ClearSessionInfo
ConfigBrowsers
ConfigLSP
CreateSessionInfo
GetMsgHookProc
GetServiceProviderInfo
IsCSLOAConfigured
IsLSPConfigured
MsgHookProc
ProcessCSProxyData
Register
RemoveProxyInfo
RunProcWithDll
SetAutoRestartProc
SetForegroundURL
ShellHookProc
StartShellEvent
UnconfigBrowsers
UnconfigLSP
UnlockShellEvent
UpdateProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ