Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
1a2d1843bbd7863129307c6fe7228674e174d52bbdee64fdcfe182f2f064ea81.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1a2d1843bbd7863129307c6fe7228674e174d52bbdee64fdcfe182f2f064ea81.dll
Resource
win10v2004-20240611-en
Target
1a2d1843bbd7863129307c6fe7228674e174d52bbdee64fdcfe182f2f064ea81
Size
547KB
MD5
ebbc11419be43953610b9be4d79a315e
SHA1
1e63614a54cf9a030910a3bf8b74479b557cdaa1
SHA256
1a2d1843bbd7863129307c6fe7228674e174d52bbdee64fdcfe182f2f064ea81
SHA512
a6b69d9d550d9fc35e27347cecede3d1018e6e3273c5f68a353f5f9290efbee8dffc3ff85c9fb8293265e1f938b43c8df1c344cc99fdfd643ae9308856979729
SSDEEP
12288:O5CZpCishRNiRFpcNHSM4VrsAvsbvsBxB+vlcw44YKcoHNHzeZY7nwBd3l9r:5p6QOyBVrsAvsbvsBxU97Y+tTeu7nI3/
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\vmagent_new\bin\joblist\598254\out\Release\HipsLogCenter.pdb
OpenProcess
InterlockedIncrement
GetCurrentThreadId
lstrcpyW
Sleep
InterlockedCompareExchange
CreateProcessW
GetStartupInfoW
lstrlenA
DebugBreak
OutputDebugStringW
GetSystemDirectoryW
CreateThread
CreateEventW
GetTickCount
GetShortPathNameW
MoveFileExW
SetFileAttributesW
DeleteFileW
GetFileSizeEx
GetSystemInfo
GetModuleHandleA
GetSystemWindowsDirectoryW
RaiseException
FlushInstructionCache
GetCurrentDirectoryW
lstrcmpiW
SetLastError
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
TerminateProcess
GetCurrentProcessId
ExitProcess
DeviceIoControl
GetFileSize
WriteFile
WideCharToMultiByte
GetFileAttributesExW
GlobalUnlock
GlobalLock
GetLocalTime
MapViewOfFileEx
CreateFileMappingW
UnmapViewOfFile
FileTimeToSystemTime
lstrcpynW
CopyFileW
GetVersionExW
ReleaseMutex
HeapWalk
HeapLock
GetCurrentProcess
HeapUnlock
CreateMutexW
SetFilePointerEx
LocalFileTimeToFileTime
SystemTimeToFileTime
SetEvent
CompareStringW
CompareStringA
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LCMapStringW
LCMapStringA
GetLocaleInfoW
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
HeapDestroy
HeapCreate
HeapReAlloc
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
GetStdHandle
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCommandLineA
GetLastError
GlobalAlloc
OpenThread
GlobalFree
WaitForSingleObject
SuspendThread
TerminateThread
GetModuleHandleW
FindFirstFileW
FindClose
CreateFileW
SetFilePointer
ReadFile
CloseHandle
DeleteCriticalSection
lstrlenW
InitializeCriticalSection
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
GetProcAddress
FreeLibrary
ExitThread
GetSystemTimeAsFileTime
CreateDirectoryW
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
LoadLibraryW
SetEnvironmentVariableA
IsWindow
FindWindowExW
PeekMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
UnregisterClassA
MessageBoxW
CallWindowProcW
DeleteMenu
ClientToScreen
CharLowerBuffW
InflateRect
GetCursorPos
InvalidateRect
GetSubMenu
TrackPopupMenu
LoadMenuW
MonitorFromPoint
GetMonitorInfoW
DestroyMenu
EnableMenuItem
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
PostQuitMessage
SetParent
KillTimer
SetTimer
GetClientRect
MoveWindow
PostMessageW
DestroyWindow
RegisterWindowMessageW
RegisterClassExW
CreateWindowExW
DefWindowProcW
CopyRect
LoadCursorW
GetClassInfoExW
ShowWindow
LoadIconW
SendMessageTimeoutW
FindWindowW
WaitForInputIdle
CharNextW
CharLowerW
GetParent
SendMessageW
SetWindowsHookExW
UnhookWindowsHookEx
LoadStringW
GetWindowLongW
SetWindowLongW
wvsprintfW
GetShellWindow
GetWindowThreadProcessId
CallNextHookEx
GetKeyState
GetStockObject
GetOpenFileNameW
GetSaveFileNameW
ImpersonateLoggedOnUser
RegCloseKey
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
LookupPrivilegeValueW
AdjustTokenPrivileges
DuplicateTokenEx
RevertToSelf
OpenProcessToken
GetTokenInformation
LookupAccountSidW
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
ord155
SHOpenFolderAndSelectItems
ord190
SHGetFileInfoW
ExtractIconExW
SHGetSpecialFolderPathW
ShellExecuteExW
ord680
ShellExecuteW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFolderPathW
CoTaskMemAlloc
CoTaskMemRealloc
RevokeDragDrop
CoTaskMemFree
CoCreateInstance
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysFreeString
VarUI4FromStr
VariantInit
VariantClear
DispCallFunc
SafeArrayGetVartype
SafeArrayCopy
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayLock
SafeArrayUnlock
VariantCopy
SafeArrayCreate
SafeArrayDestroy
SysStringLen
VarBstrCmp
PathStripPathW
PathRemoveExtensionW
UrlGetPartW
PathFindFileNameW
PathAppendW
PathRemoveFileSpecW
PathFileExistsW
SHGetValueW
PathCombineW
SHSetValueW
StrStrIW
StrCmpIW
PathFindExtensionW
PathIsDirectoryW
StrCmpNW
StrChrW
StrCmpNIW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueA
GetPreventListCount
IsSupport_DownLoadRecord
IsSupport_HipsRecord
IsSupport_PreventLog
IsSupport_PriRecord
IsSupport_TrustLog
Show_DownLoadRecord
Show_HipsRecord
Show_PreventLog
Show_PriRecord
Show_TrustLog
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ