Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
360rps.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
360rps.exe
Resource
win10v2004-20240226-en
Target
360rps.exe
Size
692KB
MD5
781ba278d254e44a1c5539ae712b7c37
SHA1
72d09f94a507686240e62f4597fb9ea29745cf29
SHA256
52c6aabe8729e8a94935f57cf736ab249607f7717802aa3b0ecffc0ea479c052
SHA512
5a8a7ed084bbc9b68d34aff86af22bc0a48e1589309ce0eae0702443d9278d3beb6a7dc093ac62f580dc7ce18390218005f86f43713141e7fd2429b2d6dcdaa7
SSDEEP
12288:PBZidSGtxREw4/I+3K16fL7b2ah4RtBx92mVPN3x:pGSvc+3KofHKlRtBxYC
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\vmagent_new\bin\joblist\225642\out\Release\360rps.pdb
GetProcAddress
GetModuleHandleA
LoadLibraryA
ProcessIdToSessionId
FindClose
FindFirstFileW
Thread32Next
SuspendThread
OpenThread
Thread32First
ResumeThread
GlobalMemoryStatus
SystemTimeToFileTime
SetEnvironmentVariableW
WritePrivateProfileSectionW
GetPrivateProfileStringW
GetDiskFreeSpaceExW
GetDriveTypeW
GetLogicalDriveStringsW
QueryDosDeviceW
WideCharToMultiByte
AreFileApisANSI
ReadProcessMemory
Module32NextW
Module32FirstW
WriteFile
GetPrivateProfileIntW
FindNextFileW
CopyFileW
lstrlenA
DebugBreak
OutputDebugStringW
TlsSetValue
TlsGetValue
GetLongPathNameW
GetTempPathW
GetACP
CreateProcessW
GetExitCodeProcess
RemoveDirectoryW
SetFileAttributesW
GetFileAttributesExW
GetFileAttributesW
ExpandEnvironmentStringsW
lstrcmpW
TerminateProcess
MoveFileW
MoveFileExW
GetTimeZoneInformation
EnterCriticalSection
LeaveCriticalSection
SetEndOfFile
SetFilePointer
GetFileSizeEx
DeviceIoControl
SetEvent
GetHandleInformation
CreateEventA
TerminateThread
DisconnectNamedPipe
OutputDebugStringA
WaitNamedPipeW
ConnectNamedPipe
CreateNamedPipeW
CreateThread
FlushFileBuffers
GetLocalTime
CompareFileTime
WaitForMultipleObjects
CreateEventW
DeleteAtom
FindAtomW
AddAtomW
GetAtomNameW
GetProcessHeap
GetSystemTime
FormatMessageW
SetFilePointerEx
LocalFileTimeToFileTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateMutexA
GetLocaleInfoW
GetConsoleMode
GetConsoleCP
IsValidLocale
TlsFree
GetVersionExW
LoadLibraryW
CreateMutexW
GetCurrentThreadId
Sleep
WaitForSingleObject
GetPrivateProfileSectionW
GetTickCount
WritePrivateProfileStringW
DeleteFileW
GetCommandLineW
OpenProcess
GetProcessTimes
FileTimeToLocalFileTime
FileTimeToSystemTime
GetWindowsDirectoryW
CreateDirectoryW
GetModuleHandleW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetModuleFileNameW
lstrcmpiW
GetCurrentThread
GetCurrentProcess
lstrlenW
LocalAlloc
LocalFree
CreateFileW
GetFileSize
ReadFile
CloseHandle
GetLastError
DeleteCriticalSection
InitializeCriticalSection
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetTimeFormatA
GetDateFormatA
GetStringTypeW
GetStringTypeA
LCMapStringA
InitializeCriticalSectionAndSpinCount
SetConsoleCtrlHandler
FatalAppExitA
LCMapStringW
HeapReAlloc
HeapSize
IsValidCodePage
GetOEMCP
GetCPInfo
QueryPerformanceCounter
HeapDestroy
HeapCreate
HeapSetInformation
FlsAlloc
SetLastError
FlsFree
FlsSetValue
FlsGetValue
TlsAlloc
DecodePointer
EncodePointer
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
ExitProcess
RtlCaptureContext
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
SetStdHandle
ReleaseMutex
GetStartupInfoW
RtlUnwindEx
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
RtlLookupFunctionEntry
RtlPcToFileHeader
UnhandledExceptionFilter
RaiseException
SetForegroundWindow
BringWindowToTop
GetWindowRect
SendMessageTimeoutW
FindWindowW
ShowWindow
CharLowerW
CharNextW
PostThreadMessageW
LoadStringW
WaitForInputIdle
WindowFromPoint
GetSystemMetrics
SystemParametersInfoW
wvsprintfW
SetWindowPos
CharUpperW
CharLowerBuffW
EnumThreadWindows
SwitchToThisWindow
SetServiceStatus
CreateProcessAsUserW
RevertToSelf
DuplicateTokenEx
SetEntriesInAclW
LookupPrivilegeValueW
AdjustTokenPrivileges
GetUserNameW
AllocateAndInitializeSid
EqualSid
FreeSid
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetSecurityDescriptorDacl
QueryServiceStatus
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
OpenThreadToken
OpenProcessToken
GetTokenInformation
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
IsValidSid
GetLengthSid
CopySid
RegQueryValueExA
ControlService
StartServiceW
CreateServiceW
ChangeServiceConfigW
ChangeServiceConfig2W
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitializeSecurity
CoInitialize
ShellExecuteW
SHChangeNotify
ShellExecuteExW
SHGetSpecialFolderPathW
SHGetFolderPathW
CommandLineToArgvW
SysAllocString
SysFreeString
VarUI4FromStr
SHDeleteValueW
StrCmpNW
PathAppendW
PathFileExistsW
StrCmpIW
SHGetValueW
SHSetValueW
StrStrIW
SHDeleteKeyW
StrCmpNIW
PathAddBackslashW
PathRemoveFileSpecW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
WTHelperProvDataFromStateData
WinVerifyTrust
CertGetNameStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ