Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Overview
overview
5Static
static
3xqmspjb/�...��.url
windows7-x64
1xqmspjb/�...��.url
windows10-2004-x64
1ǿ�...ui.exe
windows7-x64
1ǿ�...ui.exe
windows10-2004-x64
1ǿ�...6u.exe
windows7-x64
5ǿ�...6u.exe
windows10-2004-x64
5ǿ�...lp.chm
windows7-x64
1ǿ�...lp.chm
windows10-2004-x64
1ǿ�...in.dll
windows7-x64
1ǿ�...in.dll
windows10-2004-x64
1ǿ�...ci.htm
windows7-x64
1ǿ�...ci.htm
windows10-2004-x64
1ǿ�...��.htm
windows7-x64
1ǿ�...��.htm
windows10-2004-x64
1ǿ�...��.htm
windows7-x64
1ǿ�...��.htm
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
xqmspjb/新云软件.url
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
xqmspjb/新云软件.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ǿ+/BHGui.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ǿ+/BHGui.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ǿ+/Engines/6uȨ/xqmseng-6u.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
ǿ+/Engines/6uȨ/xqmseng-6u.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
ǿ+/bhhelp.chm
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
ǿ+/bhhelp.chm
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
ǿ+/fkwin.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
ǿ+/fkwin.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
ǿ+/ĵ/Э/uci.htm
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
ǿ+/ĵ/Э/uci.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
ǿ+/ĵ/Э/.htm
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
ǿ+/ĵ/Э/.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
ǿ+/ĵ/Э/йͨ��.htm
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
ǿ+/ĵ/Э/йͨ��.htm
Resource
win10v2004-20231215-en
Target
fee404e23a383d15b63c93623a652114
Size
14.9MB
MD5
fee404e23a383d15b63c93623a652114
SHA1
eafe8383ec3e5cc8426d2c854d0fa97ce8df99c3
SHA256
6dcce0e5dded9bbf8b227e8e450520c3017ecba42571558d3c64701e29321e5b
SHA512
1c441477c1561f915d3b6fcdfa9b49e44c3ef656d64083e9cdf2cfece37e10ad80bc3066e7f0afd3614d7d8ae773ea535abad57c824a63ce2fa8b38e543a3fb7
SSDEEP
393216:0dcMoXvnX9lOluGtpUmIQsmGhgKQWXUtYs5gha0Gqp:0dcMavOldMlkGhg4Y75Gahqp
Checks for missing Authenticode signature.
resource |
---|
unpack002/ǿ+/Engines/6uȨ/xqmseng-6u.exe |
unpack002/ǿ+/fkwin.dll |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCommandLineA
CheckDlgButton
RealizePalette
TransparentBlt
GetFileTitleA
ClosePrinter
RegQueryInfoKeyA
SHAppBarMessage
ImageList_GetIconSize
PathIsUNCA
OleIsCurrentClipboard
SysAllocStringByteLen
ord3
recv
WSACloseEvent
GdipCreateBitmapFromScan0
_UnInstallHook@0
PlaySoundA
InternetSetStatusCallback
AccessibleObjectFromWindow
ImmReleaseContext
malloc
GetInterfaceInfo
GetMappedFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
SetClipboardData
ShellExecuteA
CoCreateInstance
VariantInit
Netbios
WSAStartup
����o|5��W4iH��zU��%Ȕ�7����K:>_B�3�>o���-Z�/_�0���@�U�y���K��l��t�ii�6C`�|����O�O�|��/!���O��n� �1��Ns^�<j[}�~PW�Z��]������v���V8��� �V4�*ojt��p�?Zӛ�� peH@���2:xp���(���n�jÿui� Qc��/�1��� �-��/���N���Ϗ�6�m�3G���I/����ߠ���� ���;�x����!�r��qX%�5��Z(��ħ��e.�]rf��r(���E�{:=��Jn�!��䦸��x���unˀZ#��{�E����J~Ֆ@k�$`(qLSx��^u�'vy�]�ҳ#���Y�A'f�kU���?o���ȉ�|L� ��R��æ�/r�L|�`[ڦ��b�|ǩ�T�hF�����4er hO������z}Hؖ��8�~��e�g���s?���אָ�5�,_��Hv�]���c�����*x��T��5���ɛ�]�c���2[����@`SL�̨�n���0�����oX�&n S}C���_��,�G���M6��>H���5����#��6L�Գ���Tx�P�A>}�����*a��\�Η�+2�c���A�vr� 㗩1��0?ڸ�y��1|o�.�#X/�� �I# ���G�Td��f��9W�N�3F$}���$*F���)붾�0L��n{�+헹�̺��(`a����[�[��ά������0�h)A������P�>\H�`�!���=�U*�������DK�o�M *�{ ノ��� �0sˎ&�*���BG沛��B��ۊ��)F���{���Ap��&���i��#���M#&)���.]OD��*ƅe!E%)��lMg�� ��&���-�bz�8��fg�BF�ې�����h�2�ف�3qT�4�c��M�y�ݚ�?l�;B���Z�P8��[moWf��K!�����j#FC�EF�}�zE04�q��������k�Կi]��XҶ�N�������Z����,���w}e�>��X�AC-��қ^����+�,�I�����-H���GR��!��x����X�^q5��\D{ؠ:���a����BZ>ȱ����2�����j��,O�K���R�C�|[���0\��P������ u�����Z�6VPD$���G�`�1��N���֦q����bȟ%{�����ݙ�Z*;�?va��i���kw_��8�_��.(9(�8�� �09�6&��G!!�1w��x�� �M�w�e/�r��+��3�5�|���E {�q��伿����I�#Fo��P\������S��|<A������O{��0=�A,��'�"�(Ν�E�r��'�ƚN���K _� ���w�l���ߦ���8��'(�ٻ�X߾s��ߠ#��2����v�PԳ�ˆ�)��J�\Y��r��<r.�͢0�u�����$�����+}��Mv;��_^rOS�q�=,����w��ZD���ɷ�+_�ן[5 R���\�C�F�`�8� �OC�]�*q�D�� �VfJq��K�3���uZ�Z�M�� ��G�H������-�s��'P��Rb���.�*Z�kK<���;9[�!Vu�~�m7������N61�T��)LSu�0%�W�O����Z��rd>G8{Y����e� �D�KW�"����, �4;����J~ƪ�Q��}�����Kh�tb���r� @n��(>�X >F�K�7z*Z ���c��.��PI�0h����Z��s��̓!��X�oп@l+��N�r�70��r��� zeeع~�g� ��m0�B c��?���if~��c�G��K�G�������Ӂ>:t���-�].���IºJ3��nrf�W.���� !FIu/�jb��Z$ؗcG�|IJLeĤȓ36�{���Ѽ�_Z&��O���b��Tt�N��y������7�� ��Q`@vu����M�1�g�4 �0TW索ݻ�¦�%V�t�4� ג9T �cZqbC������7h����d�d�c�A%�X�sz��U�WO/X�������i+W��i�2�o@o.�&F�U:4�{���w�Ď��vժ�YN��͵�qiU��,~�/���s!��E��&hB)<+���?Ѹ�[�<$h-GG +\���L�����������އ�?�XzˏV�Z *c��,�l}6C�br6^*1�#]$,hO�G��Z(��=���@eb�t�����D�����V�A�3�&"�����dz�f��_LgJYʉg%SLct#�������"�%�m�h.Η�b�G`�Q�,�����B_��Jt=_ru��Z.��r���q�JM�]nG�����`�1������C�& �Y������8�Y'Ӹ��#�ӳ��>ᥰ�#3�&,ZM;@T�w7�3���{^�Ďs�VG�JaX5l�q*�C(�@��a��m�z%�v[��d�� �{�X2M/�!��:_7�f���a���Qo����#_��X��Xv��?�m��l�9����m�����f���f7��Lk����Z��S�(�߱�p�2KV���([�b��<}�Th����w�V%J��k���?�p,�2�n��!�j�2�����iX�3��;E�/��e2�[��#�e`Ny5Sޢ��}� ��x?.�����Gu��4ބŞ���l�G�!H'0O��7]C�{�����l�r�� ����I�;7�۫k�rrF��K�����6(��E!�<�vU��O��>�z$���~X�!�x�8���_ �J�؈aN�����6n�?-�<&oEw�D)7��/N��p1�C�������9i���S�[`$��,3m��ϛ���մD�LجL�.�WBW_W�͢��t�o��X�x�8�r�<*�绅���W7�����P����;6ʠR��Cޯi�߫-%��6���Xr�+H���(#�K�N��p|�' �T��|�W�f�l���j�V�W� �B]����M!t���4��B��h
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualFree
FlushInstructionCache
WriteProcessMemory
VirtualAlloc
ReadProcessMemory
VirtualProtect
VirtualQuery
GetProcAddress
GetModuleHandleA
GetCurrentProcess
GetModuleFileNameA
CreateFileW
HeapSize
GetStringTypeW
LCMapStringW
MultiByteToWideChar
GetLastError
HeapFree
HeapAlloc
GetCurrentThreadId
DecodePointer
GetCommandLineA
CloseHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
RtlUnwind
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
SetFilePointer
HeapReAlloc
WriteConsoleW
GetWindowTextA
GetClassNameA
GetParent
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
_InstallHook@0
_UnInstallHook@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ