Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
tmpkgqymv8n.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmpkgqymv8n.dll
Resource
win10v2004-20240508-en
Target
tmpkgqymv8n
Size
467KB
MD5
61863b4c1aeefe10d69f54c03d373fd5
SHA1
4b448f7b4358945b3e9d744d97d6b7c860e5c5b8
SHA256
495b13461b13c3ce1c766d9899b860add4dfcd9e6b2dc5815389aed6e26cda0e
SHA512
f97b69a5567e477ca67ad7f41933b00a57f74bb4f69c01161c17735b8bb35590cf06aff0fafe8308104e9385a0eb808d8735be9a744c8d2d100c9a9ea5f842a8
SSDEEP
12288:ybYu1g7I2hxD54yFTuWwp6wYcoDvbAfE63U4:qg7I2hZDFTuW/wx+kHU4
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
D:\a\1\s\x64\Release\PsfRuntime64.pdb
GetFinalPathNameByHandleW
GetModuleFileNameW
CreateFileW
GetCurrentThreadId
GetCurrentPackagePath
MultiByteToWideChar
GetLastError
OutputDebugStringW
CloseHandle
HeapAlloc
GetCurrentPackageFamilyName
GetProcAddress
GetCurrentPackageFullName
GetProcessHeap
GetModuleHandleW
OutputDebugStringA
DebugBreak
LoadLibraryExW
IsDebuggerPresent
SetLastError
TerminateProcess
GetFileAttributesW
ResumeThread
GetFileAttributesA
CreateProcessW
QueryFullProcessImageNameW
CreateProcessA
GetCurrentThread
LoadLibraryW
FreeLibrary
WriteConsoleW
HeapSize
GetCurrentApplicationUserModelId
GetModuleHandleExW
HeapFree
WideCharToMultiByte
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
VirtualProtect
VirtualFree
GetCurrentProcess
VirtualAlloc
SuspendThread
VirtualProtectEx
GetThreadContext
FlushInstructionCache
SetThreadContext
VirtualQuery
VirtualQueryEx
WriteProcessMemory
GetEnvironmentVariableW
WaitForSingleObject
OpenProcess
VirtualAllocEx
ExitProcess
ReadProcessMemory
IsWow64Process
GetExitCodeProcess
LocalFree
FormatMessageA
GetStringTypeW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
SetEndOfFile
SetFilePointerEx
AreFileApisANSI
GetFileInformationByHandleEx
CompareStringEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedFlushSList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapReAlloc
GetStdHandle
GetFileType
ReadFile
GetConsoleMode
ReadConsoleW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
MessageBoxW
EventSetInformation
EventUnregister
EventWriteTransfer
EventRegister
SHGetKnownFolderPath
CoTaskMemFree
?PSFQueryPackageFamilyName@@YAPEB_WXZ
DetourFinishHelperProcess
PSFQueryAppLaunchConfig
PSFQueryAppMonitorConfig
PSFQueryApplicationId
PSFQueryApplicationUserModelId
PSFQueryConfig
PSFQueryConfigRoot
PSFQueryCurrentAppLaunchConfig
PSFQueryCurrentExeConfig
PSFQueryDllConfig
PSFQueryEndScriptInfo
PSFQueryExeConfig
PSFQueryFinalPackageRootPath
PSFQueryPackageFullName
PSFQueryPackageRootPath
PSFQueryStartScriptInfo
PSFRegister
PSFReportError
PSFUnregister
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ