Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
87076192a96719cd15d8289f79cbedced935c8cb4f481d6c1e8117bffbd43e9a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
87076192a96719cd15d8289f79cbedced935c8cb4f481d6c1e8117bffbd43e9a.exe
Resource
win10v2004-20240412-en
Target
87076192a96719cd15d8289f79cbedced935c8cb4f481d6c1e8117bffbd43e9a
Size
1.2MB
MD5
6a7dd0e282da0f818e65c1b73ee112b2
SHA1
08a5c32dcb72038c06e80310fbf366caf6616a4a
SHA256
87076192a96719cd15d8289f79cbedced935c8cb4f481d6c1e8117bffbd43e9a
SHA512
57ec7d2061c036d7e96273aad1986133484129b19276cd70d96628a89611cfc7522fb1c5945a2b9b37170a94462489bfa4e99d386325c4aa81290a1db1747aaa
SSDEEP
24576:WrX2J/KHuuqKqygMj6QjE3Y+kBX5fog5RcL92KTKK4KKDyK5FZ1EEEEmEEE1EEEX:WrX24Ou0yTX5foOcUKTKK4KKDyK5FZ1Y
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
D:\jenkins\workspace\ci.dingding.manual.new\DingTalk-Win\win\bin\release\DingTalk.exe.pdb
?Execute@DingTalkProtect@dt_protect@@SA_NXZ
?getPDH@CPDHSystem@@QAE?AV?$shared_ptr@VCPDH@@@std@@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@3@@Z
?kPdhPysicalDiskTotalDiskTime@CPDH@@2QBDB
?kPdhProcessTotalProcessorTime@CPDH@@2QBDB
?GetLimitSingleInstance@DingTalkMain@@SAAAVCLimitSingleInstance@@XZ
?addCounter@CPDH@@QAE_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z
?start@CPDH@@QAE_NXZ
?getInstance@CPDHSystem@@SAPAV1@XZ
EqualSid
SetEntriesInAclW
GetSecurityInfo
GetSidSubAuthority
InitializeSid
CreateWellKnownSid
CopySid
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
FreeSid
LookupPrivilegeValueW
DuplicateToken
CreateRestrictedToken
SetThreadToken
GetTokenInformation
CreateProcessAsUserW
AccessCheck
IsValidSid
GetNamedSecurityInfoW
MapGenericMask
ImpersonateLoggedOnUser
SystemFunction036
ConvertSidToStringSidW
DuplicateTokenEx
GetKernelObjectSecurity
SetKernelObjectSecurity
GetAce
OpenProcessToken
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDisablePredefinedCache
RevertToSelf
WriteFile
CreateFileMappingW
UnmapViewOfFile
FreeLibrary
GetModuleHandleW
GetProcAddress
LoadLibraryExA
LoadLibraryExW
GetCommandLineW
SetEnvironmentVariableW
SetCurrentDirectoryW
CreateDirectoryW
CreateFileW
GetFileAttributesW
ReadFile
RemoveDirectoryW
GetTempPathW
OutputDebugStringA
SetUnhandledExceptionFilter
SetErrorMode
Sleep
GetCurrentProcessId
GetLocalTime
GetTickCount
GetSystemDirectoryW
GetVersionExW
FindResourceExW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryA
LoadLibraryW
GetCurrentThreadId
LocalFree
GetPrivateProfileStringW
MultiByteToWideChar
WideCharToMultiByte
AllocConsole
GetPrivateProfileIntW
GetUserDefaultLangID
GetSystemDefaultLangID
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
InitOnceComplete
InitOnceBeginInitialize
GetStringTypeW
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStdHandle
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
FreeLibraryAndExitThread
ExitThread
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetCPInfo
LCMapStringEx
GetFileSize
VirtualQuery
VirtualFree
VirtualProtect
VirtualAlloc
FlushInstructionCache
SetThreadContext
GetThreadContext
WritePrivateProfileStringW
GetCurrentThread
GetCurrentProcess
IsWow64Process
WriteProcessMemory
ReadProcessMemory
VirtualQueryEx
VirtualProtectEx
VirtualAllocEx
CreateProcessW
ResumeThread
TerminateProcess
ExitProcess
WaitForSingleObject
SetLastError
CloseHandle
GetEnvironmentVariableW
ProcessIdToSessionId
GetEnvironmentVariableA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
DecodePointer
SuspendThread
FreeEnvironmentStringsW
WriteConsoleW
EncodePointer
HeapSetInformation
SetProcessDEPPolicy
GetCurrentDirectoryW
FormatMessageA
CreateIoCompletionPort
CreateEventW
CreateThread
ResetEvent
GetQueuedCompletionStatus
UnregisterWait
SetEvent
RegisterWaitForSingleObject
TerminateJobObject
PostQueuedCompletionStatus
DuplicateHandle
SetInformationJobObject
GetUserDefaultLCID
GetUserDefaultLocaleName
EnumSystemLocalesEx
GetProductInfo
GetNativeSystemInfo
SleepConditionVariableCS
IsDebuggerPresent
GetThreadId
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnregisterWaitEx
GetFileType
SetHandleInformation
AssignProcessToJobObject
MapViewOfFile
GetCurrentProcessorNumber
SetThreadAffinityMask
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
ExpandEnvironmentStringsW
QueryDosDeviceW
GetLongPathNameW
VirtualFreeEx
GetModuleHandleExW
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
RtlCaptureStackBackTrace
TlsGetValue
AcquireSRWLockExclusive
CreateNamedPipeW
CreateRemoteThread
CreateJobObjectW
QueryInformationJobObject
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
CreateMutexW
TlsAlloc
TlsFree
TlsSetValue
SetFilePointerEx
GetFileSizeEx
SetEndOfFile
FlushFileBuffers
SearchPathW
lstrlenW
DebugBreak
FindClose
FindNextFileW
FindFirstFileExW
InitializeConditionVariable
SleepConditionVariableSRW
WakeAllConditionVariable
WakeConditionVariable
OutputDebugStringW
InitializeSRWLock
InitializeCriticalSectionEx
TryEnterCriticalSection
WaitForSingleObjectEx
CoCreateInstance
CoInitialize
CoTaskMemFree
OleUninitialize
OleRun
OleInitialize
SysFreeString
SysAllocString
VariantClear
CommandLineToArgvW
ShellExecuteExW
SHGetFolderPathW
PathCombineW
PathAppendW
PathFileExistsW
EnumWindows
MessageBoxW
GetPropW
SetForegroundWindow
SetActiveWindow
BringWindowToTop
IsIconic
ShowWindow
CreateDesktopW
SetProcessWindowStation
CreateWindowStationW
GetProcessWindowStation
GetThreadDesktop
GetUserObjectInformationW
IsWindowVisible
CloseWindowStation
CloseDesktop
InternetCheckConnectionW
?GetExceptionFilterInstallerService@fi@@YAPAVIExceptionFilterInstaller@1@XZ
GdiplusStartup
GdiplusShutdown
SymCleanup
SymSetOptions
SymInitialize
SymGetSearchPathW
SymSetSearchPathW
SymFromAddr
SymGetLineFromAddr64
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
timeGetTime
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE