Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
48b1d798f260c3a15a38d3440550663a394c080c934824f27e2e88fc0dc506ae.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48b1d798f260c3a15a38d3440550663a394c080c934824f27e2e88fc0dc506ae.dll
Resource
win10v2004-20240226-en
Target
48b1d798f260c3a15a38d3440550663a394c080c934824f27e2e88fc0dc506ae
Size
187KB
MD5
028ae5f590d3a513a068ac241b34c3e9
SHA1
7466c5869a4dc6dc44708599a7a8c4eeba6ad42d
SHA256
48b1d798f260c3a15a38d3440550663a394c080c934824f27e2e88fc0dc506ae
SHA512
45e79f36874f32e064c7a508b9db24ff1cc6090319ca88e94c5af5f4a4652f870d8ad988d7e7ad06607f6855eaefdafdbade749606dbce33d158e81063ad4c13
SSDEEP
3072:VkMZCQo8j18hSKYVBD9GIS0lya99eMS2lQBV+UdE+rECWp7hKg86uW:V/Ca6vY7D9M494BV+UdvrEFp7hKgF
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\vmagent_new\bin\joblist\599817\src\3\360fsflt_dll_dbgad2\user\objfre_wxp_x86\i386\qutmload.pdb
_initterm
_XcptFilter
_errno
_strnicmp
wcsncpy
_vsnprintf
_amsg_exit
malloc
free
srand
rand
wcsrchr
_wcsnicmp
memmove
memcpy
memset
_vsnwprintf
CopyFileW
GetModuleFileNameW
GetSystemDirectoryW
MoveFileExW
GetTickCount
DeleteFileW
CreateFileA
DeviceIoControl
FreeLibraryAndExitThread
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
RtlUnwind
InterlockedCompareExchange
Sleep
InterlockedExchange
OpenThread
SuspendThread
ResumeThread
GetSystemWindowsDirectoryW
GetNativeSystemInfo
VirtualQueryEx
GetFileSize
GetSystemDirectoryA
DeleteFileA
MoveFileExA
CopyFileExW
VirtualQuery
HeapAlloc
HeapFree
OutputDebugStringA
GetCurrentThreadId
CreateEventW
SetEvent
WaitForSingleObject
CloseHandle
SleepEx
VirtualFree
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetLastError
OpenProcess
GetOverlappedResult
VirtualAlloc
CreateThread
GetVersionExW
FreeLibrary
LoadLibraryW
SetFilePointer
ReadFile
CreateFileW
QueryDosDeviceW
GetLogicalDriveStringsW
GetProcessHeap
GetModuleHandleA
GetModuleHandleExW
OpenServiceW
CreateProcessAsUserW
GetTokenInformation
OpenProcessToken
LookupPrivilegeValueW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
OpenServiceA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
DeleteService
OpenSCManagerW
AdjustTokenPrivileges
StartServiceW
CloseServiceHandle
CreateServiceW
QueryServiceConfigW
ChangeServiceConfigW
RegEnumKeyExW
RegQueryValueExW
WSACreateEvent
WSACloseEvent
WSAStartup
inet_ntoa
WSAGetLastError
WSAResetEvent
GetIpAddrTable
NotifyAddrChange
PathFileExistsW
SHDeleteKeyW
SHDeleteKeyA
StrCmpIW
PathFindExtensionW
PathFindFileNameW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
CreateEnvironmentBlock
DestroyEnvironmentBlock
AddAntiInjectDllName
AddAntiInjectWhiteProcessName
AddBlackFileName
AddBlackProcessByPid
AddClientRule
AddClientRule2
AddExceptionRule
AddInjectBlockRule
AddInjectProcessName
AddInjectRule
AddKernelRule
AddProtectedFile
AddProtectedFile2
AddPsCreationExceptRule
AddRule
AddRule2
AddSpecialProtectedFile
AddTraceRule
AddWhiteFileName
AddWhiteProcessByPid
CleanAllPsCreationExceptRules
CleanInjectRule
CleanOpenFileRules
CleanupAllClientRules
CleanupAllRules
ClearAntiInjectRule
ClearBlackFileList
ClearBlackProcessList
ClearWhiteFileList
ClearWhiteProcessList
CloseClientSession
CompressHistoryDatabase
ConfigObjectTraceRule
ConfigObjectTracer
ConvertNtName64
CreateClientHandle
CreateClientSession
CutHistoryDatabase
EnableLockCallBack
EnableProtectRule
EnableRemoteFileMonAddress
EncodeDComFilterData
EnumExistsCallbacks
FlushObjectTracerLogs
FlushObjectTracerLogs2
GetBootRuleData
GetClientSessionHandle
GetFileRemoteAddress
GetLastProcessCreationTime
GetObjectTracerConfig
InsertBrowserProcess
InsertProtectionModule
InsertProtectionProcess
Install
LoadHistoryDatabase
NotifyDriverClientResult
NotifyDriverResult
QueryDriverVersion
QueryFileInformation
QueryProtectedInformation
QuerySetInjectDllStatus
ReloadObjectTracerRules
RemoveAllBrowserProcess
RemoveAllInjectProcessName
RemoveAllKernelRule
RemoveAllProtectedFile
RemoveAllProtectedFile2
RemoveAllProtectionModule
RemoveAllProtectionProcess
RemoveAllTraceRules
RemoveBlackFileName
RemoveBlackProcessByPid
RemoveInjectProcessName
RemoveProtectedFile
RemoveProtectedFile2
RemoveSpecialProtectedFile
RemoveTraceRule
RemoveWhiteFileName
RemoveWhiteProcessByPid
ReplyClientResult
SetAppdVersion
SetBypassSpecialBTHCmd
SetBypassSpecialLogonUIProcess
SetClientCloseAction
SetCommandLine
SetDDEProcess
SetFixWDASList
SetLeaderProcess
SetOpenFileRule
SetProcFilter
SetProcessContext
SetProcessProtection
SetProtectionState
SetProtectionState2
SetSharedDevice
SetupInstall
StackWalking
StartHook
StartHook2
StartHookEx
StartRemoteFileMon
StartRemoteFileMonx64
StopHook
Uninstall
UnloadHistoryDatabase
UserConfigObjectTracer
WriteDCBProcessMemory
aklSetProcess
aklStart
aklStop
cfeAddFilterPathPattern
cfeCleanFilterPathPattern
dcAddProcessDllRule
dcCleanAll
dcDeclare
dcEnableDbCheck
dcRemoveProcessDllRule
dcSetDllCache
pslClearRecord
pslDisablePerpetually
pslEnablePerpetually
pslFindClose
pslFindFirstProcess
pslFindFirstSection
pslFindNextProcess
pslFindNextSection
pslGetCurrentProcessTimesInfo
pslStartRecord
pslStopRecord
pslStopRecordTimesInfo
swCleanProcessRules
swSetMessage
swSetProcess
tdStartMon
tdStopMon
udCleanAllCache
udSetProcessAction
udSetProcessSoftwareId
wmpGetBuffer
wmpSetState
zdGetBuffer
zdGetInfo
zdGetStatus
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ