Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
360DrvMgrInstaller_beta.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
360DrvMgrInstaller_beta.exe
Resource
win10v2004-20240226-en
Target
360DrvMgrInstaller_beta.exe
Size
9.5MB
MD5
24eb7f431b5992321055dbfefb3e96df
SHA1
f0364dcaaee80685c79ab63738e9c6b50cf54e7c
SHA256
869c459d026528164c8d2246c0b38f7f09da25d3abb396c46900d40bcaeb9485
SHA512
a9023e71e9efcc781823d975b31bd9052b9abcabc574289c8582ceda4ba021f683fc5d08d13cac464e4257d3b4aefc718aac62668cdb0a7c8f9f6b0fb1bea02c
SSDEEP
196608:Oe3S7ydxHLVBU16b6IcXOJUZXEiDztAJ0rk/RaUdoJTUiCCx6E8R:O8hRRGA+gmZDzacFUJq0lR
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\驱动大师\DriverManager-2.0.0.1430-20180821-2.0.0.1420-temp\Setup\install\ReleaseInstaller.pdb
FindFirstChangeNotificationW
GetLogicalDriveStringsW
GetFileSize
SetFilePointer
GetFileInformationByHandle
ReadFile
SetEndOfFile
GetStdHandle
CompareFileTime
FileTimeToSystemTime
LockResource
ExitProcess
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
CreateMutexW
SetLastError
WideCharToMultiByte
GetDiskFreeSpaceExW
GetExitCodeThread
Sleep
RaiseException
InterlockedIncrement
LeaveCriticalSection
GlobalUnlock
GlobalLock
CreateEventW
DeleteAtom
FindAtomW
ReleaseMutex
AddAtomW
OpenThread
GetAtomNameW
GetSystemTime
GetLocalTime
FormatMessageW
GetFileSizeEx
SetFilePointerEx
FindCloseChangeNotification
SystemTimeToFileTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
CreateFileA
GetTimeZoneInformation
WriteConsoleW
EnterCriticalSection
WriteConsoleA
FlushFileBuffers
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
InterlockedExchange
SetConsoleCtrlHandler
WriteFile
LCMapStringA
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
GetFileType
SetHandleCount
HeapCreate
FatalAppExitA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetCurrentThread
TlsFree
TlsSetValue
TlsAlloc
GetTempFileNameW
SearchPathW
GetCurrentDirectoryW
GetFullPathNameW
GetShortPathNameW
CreateDirectoryW
RemoveDirectoryW
SetFileTime
GetSystemDirectoryW
GetWindowsDirectoryW
FindClose
FindNextFileW
FindFirstFileW
GetVolumeInformationW
MoveFileW
ResetEvent
SetEvent
FreeResource
GlobalAlloc
ResumeThread
GlobalFree
LocalFileTimeToFileTime
MulDiv
GetCurrentThreadId
FlushInstructionCache
GetTickCount
lstrcpynW
GetLastError
LocalFree
DeleteFileW
MoveFileExW
lstrlenA
OutputDebugStringW
DebugBreak
SetFileAttributesW
GetFileAttributesW
InterlockedDecrement
lstrlenW
GetTempPathW
TlsGetValue
RtlUnwind
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ExitThread
HeapSize
HeapReAlloc
HeapDestroy
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
FindResourceExW
InterlockedCompareExchange
GetModuleHandleA
lstrcmpiA
lstrcmpA
GetCurrentProcessId
DeviceIoControl
CreateThread
ExpandEnvironmentStringsW
LocalAlloc
GetSystemInfo
GetProcessTimes
GetSystemTimeAsFileTime
DuplicateHandle
HeapFree
GetProcessHeap
HeapAlloc
SetErrorMode
FileTimeToLocalFileTime
GetFileTime
VirtualQuery
SetProcessWorkingSetSize
WaitForMultipleObjects
TerminateProcess
OpenProcess
CopyFileW
LCMapStringW
CreateFileW
GetVersionExW
GetCurrentProcess
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessW
FreeLibrary
LoadLibraryW
GetConsoleOutputCP
GetProcAddress
DestroyWindow
wvsprintfW
CharNextW
ExitWindowsEx
BeginPaint
SendMessageW
GetWindowLongW
GetClientRect
GetWindowTextW
EndPaint
SetWindowPos
SetWindowLongW
InvalidateRect
KillTimer
GetWindowRect
SetTimer
LoadCursorW
ShowWindow
CharToOemW
CopyRect
GetUpdateRect
SetRect
ReleaseDC
GetWindowDC
GetWindow
MonitorFromWindow
GetMonitorInfoW
LoadImageW
GetWindowTextLengthW
ReleaseCapture
GetDlgCtrlID
SystemParametersInfoW
SetCapture
CreateDialogParamW
CallWindowProcW
GetDlgItem
GetDC
PtInRect
ClientToScreen
GetCapture
UpdateWindow
DrawFocusRect
GetSystemMetrics
InflateRect
DrawEdge
GetSysColor
IsWindowEnabled
OffsetRect
FillRect
DrawTextW
PeekMessageW
TranslateMessage
DispatchMessageW
CharLowerW
MessageBoxW
DefWindowProcW
BringWindowToTop
SetForegroundWindow
FindWindowW
SetWindowRgn
GetParent
AdjustWindowRectEx
GetMenu
SetCursor
CreateWindowExW
GetClassInfoExW
RegisterClassExW
IsWindow
RedrawWindow
IsIconic
LoadStringW
PostQuitMessage
PostThreadMessageW
SetDlgItemTextW
IsClipboardFormatAvailable
OpenClipboard
GetClipboardData
CloseClipboard
EmptyClipboard
SetClipboardData
MonitorFromPoint
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
FindWindowExW
SubtractRect
PostMessageW
MapVirtualKeyW
GetKeyNameTextW
UnregisterClassA
GetMessageW
GetDesktopWindow
MapWindowPoints
EnableWindow
SetWindowTextW
GetBitmapBits
OffsetViewportOrgEx
CreatePatternBrush
CreateDIBPatternBrushPt
CreateFontW
CreateSolidBrush
GetCurrentObject
CreateDIBSection
SetTextColor
CreatePolygonRgn
CreateFontIndirectW
GetObjectW
GetStockObject
SetViewportOrgEx
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
DeleteDC
SelectObject
SetBkMode
GetDeviceCaps
SetNamedSecurityInfoW
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegQueryValueExW
CopySid
GetTokenInformation
RegEnumKeyW
RegSetKeySecurity
FreeSid
RegCreateKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExA
SetEntriesInAclW
GetNamedSecurityInfoW
SetSecurityDescriptorDacl
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
RegGetKeySecurity
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAce
InitializeSecurityDescriptor
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteW
ord165
SHGetSpecialFolderPathW
SHFileOperationW
SHFreeNameMappings
SHAppBarMessage
SHGetSpecialFolderLocation
SHChangeNotify
SHGetFileInfoW
CoCreateGuid
CoTaskMemFree
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
CoCreateInstance
OleInitialize
OleUninitialize
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoTaskMemAlloc
CoTaskMemRealloc
OleLoadPicture
SysFreeString
VariantCopy
SysAllocString
SysAllocStringByteLen
VariantInit
VariantClear
VarUI4FromStr
InternetReadFile
HttpQueryInfoW
InternetOpenUrlW
InternetCloseHandle
InternetOpenW
PathRemoveFileSpecW
PathIsPrefixW
StrStrIW
PathFindFileNameW
PathRemoveExtensionW
SHSetValueW
PathIsRootW
PathCombineW
PathFileExistsW
SHGetValueW
PathAppendW
SHDeleteKeyW
PathMatchSpecW
PathFindExtensionW
PathIsURLW
StrToIntExW
SHGetValueA
PathIsDirectoryW
ImageList_Destroy
ImageList_Remove
ImageList_Duplicate
ImageList_SetImageCount
ImageList_Add
ImageList_Create
ImageList_GetIconSize
InitCommonControlsEx
ImageList_Draw
_TrackMouseEvent
AlphaBlend
SetupIterateCabinetW
CryptCATAdminCalcHashFromFileHandle
WinVerifyTrust
CryptCATAdminAcquireContext
CryptCATAdminEnumCatalogFromHash
CryptCATAdminReleaseCatalogContext
CryptCATAdminReleaseContext
WTHelperProvDataFromStateData
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
CertGetNameStringW
Netbios
RasGetConnectStatusW
RasEnumConnectionsW
EnumProcesses
GetProcessMemoryInfo
GetModuleBaseNameW
GetModuleFileNameExW
EnumProcessModules
GetSaveFileNameW
GetOpenFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ