Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
VulDetector_2_0_766_127.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VulDetector_2_0_766_127.exe
Resource
win10v2004-20240226-en
Target
VulDetector_2_0_766_127.exe
Size
2.7MB
MD5
3ca7808debb1f860ca703bb1923e09b3
SHA1
b8d2f3070e7d580918381ddfe8fc8c854a0ca310
SHA256
e32f164aaf85732998c5d8b43f222a916d67ba62809af9406c50415bb4f19347
SHA512
47310dd449486a37bcedea94deae064bcc94c59b1f6be6b1bd4df05994dadc3f2e8380aff555f01baa1640a64c4dcb8669740bb70e11244d91ba811075545192
SSDEEP
49152:7ysVgzOTodcT+Np/LoLvlmHQVSaQyNudND4QJLsHbF5vilpOlpaOA4:GscIodX/LoLvlmHc7NQD4ALspJqQc2
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\jenkins_Trunk\workspace\Qzz_vul\qqpcmgr_proj\bin\Release\VulDetector.pdb
htonl
htons
GetCPInfo
OpenFileMappingW
UnmapViewOfFile
GetSystemTimeAsFileTime
GetTempPathW
MapViewOfFile
InterlockedExchange
ResetEvent
InterlockedCompareExchange
InterlockedExchangeAdd
MoveFileW
GetLocalTime
GetFileAttributesExW
GetSystemInfo
GetSystemDefaultLangID
LoadLibraryA
CreateDirectoryW
WaitForMultipleObjects
DuplicateHandle
InitializeCriticalSectionAndSpinCount
HeapAlloc
GetProcessHeap
HeapFree
GetModuleFileNameA
TerminateProcess
TlsGetValue
CreateIoCompletionPort
PostQueuedCompletionStatus
TlsFree
GetQueuedCompletionStatus
TlsSetValue
TlsAlloc
IsDebuggerPresent
OpenEventW
WriteFile
VirtualAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetVersionExA
GetStartupInfoW
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetFilePointer
ExitProcess
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetStdHandle
VirtualFree
HeapDestroy
HeapCreate
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
CreateProcessW
OutputDebugStringW
MultiByteToWideChar
ReadFile
GetFileSize
GetEnvironmentStringsW
GetCommandLineA
QueryPerformanceCounter
GetUserDefaultLCID
GetLocaleInfoA
DeleteFileW
CopyFileW
FreeLibrary
CreateFileW
EnumSystemLocalesA
EnterCriticalSection
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
SetEndOfFile
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
CloseHandle
WaitForSingleObject
SetEvent
CreateEventW
LeaveCriticalSection
GetVersionExW
LoadResource
LockResource
SizeofResource
GetLastError
GetProcAddress
FindResourceW
LoadLibraryW
GetModuleFileNameW
FindResourceExW
IsProcessorFeaturePresent
InterlockedDecrement
CreateMutexW
lstrcmpiW
GetVersion
GetCommandLineW
GetCurrentThreadId
SetDllDirectoryW
RemoveDirectoryW
SetLastError
RaiseException
FreeResource
WideCharToMultiByte
FlushInstructionCache
LoadLibraryExW
lstrlenA
GetSystemDirectoryW
GetModuleHandleW
GetFileAttributesW
InterlockedIncrement
Sleep
GlobalFree
ExpandEnvironmentStringsW
GlobalAlloc
lstrlenW
GetCurrentProcess
GetCurrentProcessId
GetModuleHandleA
GetThreadLocale
GetTempFileNameW
GlobalLock
HeapReAlloc
ExitThread
CreateThread
SetTimer
KillTimer
DestroyIcon
TrackPopupMenu
GetWindowTextW
GetFocus
GetSysColor
GetWindowTextLengthW
SendMessageTimeoutW
EqualRect
GetDlgCtrlID
GetSystemMetrics
DrawFrameControl
PtInRect
DrawTextW
PostThreadMessageW
SetCursor
DrawIconEx
ReleaseCapture
IsWindowVisible
SetCapture
GetSystemMenu
EndPaint
BeginPaint
SetWindowTextW
FindWindowW
GetKeyState
EnableWindow
CallWindowProcW
SetWindowLongW
DestroyWindow
PostMessageW
FindWindowA
MsgWaitForMultipleObjectsEx
GetQueueStatus
PostQuitMessage
WaitMessage
UnregisterClassW
LoadImageW
SetActiveWindow
DefWindowProcW
IsWindow
MoveWindow
CharNextW
GetActiveWindow
IsWindowEnabled
MapWindowPoints
GetWindowLongW
GetWindowDC
ReleaseDC
GetDesktopWindow
GetDC
GetParent
CreateWindowExW
FillRect
SystemParametersInfoW
TranslateMessage
ClientToScreen
GetMessageW
GetClientRect
InvalidateRect
GetWindowRect
RegisterClassExW
SetWindowPos
OffsetRect
SetWindowRgn
ShowWindow
InflateRect
LoadCursorW
GetClassInfoExW
GetWindow
SetRect
FrameRect
SendMessageW
CopyRect
GetDlgItem
GetMonitorInfoW
MonitorFromWindow
MessageBoxW
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjects
UnregisterClassA
LoadStringW
CopyImage
LoadIconW
SetBkMode
MoveToEx
RectInRegion
GetTextExtentPoint32W
TextOutW
RoundRect
SelectClipRgn
GetClipRgn
RestoreDC
SaveDC
CreateCompatibleDC
CreateDIBSection
OffsetRgn
SetRectRgn
BitBlt
CreateFontIndirectW
GetObjectW
LineTo
GetStockObject
ExtSelectClipRgn
GetTextMetricsW
CreateRectRgnIndirect
SetTextColor
CreateBitmap
CombineRgn
CreateRectRgn
StretchBlt
CreatePen
DeleteDC
ExtTextOutW
CreateSolidBrush
SetBkColor
SelectObject
CreateCompatibleBitmap
DeleteObject
Rectangle
GetCurrentObject
RegSetValueExW
RegEnumKeyExW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyW
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
SHGetSpecialFolderPathW
SHFileOperationW
ShellExecuteW
SHCreateDirectoryExW
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
VarUI4FromStr
OleLoadPicture
StrToIntA
PathAppendW
PathFileExistsW
PathAddBackslashW
PathRemoveFileSpecW
VerQueryValueW
GetFileVersionInfoW
_TrackMouseEvent
GdipCreateImageAttributes
GdipDeleteGraphics
GdipCreateFromHDC
GdipGetImageHeight
GdipDisposeImageAttributes
GdipAlloc
GdipFree
GdipDisposeImage
GdipDrawImageRectI
GdipCreateHBITMAPFromBitmap
GdipSetImageAttributesColorMatrix
GdipLoadImageFromStream
GdiplusStartup
GdipDrawImageRectRectI
GdiplusShutdown
GdipDrawImageI
GdipCloneImage
GdipCreateBitmapFromStream
GdipGetImageWidth
InternetOpenW
InternetReadFile
InternetOpenUrlW
HttpQueryInfoW
InternetGetConnectedState
InternetCloseHandle
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ