Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b7aec41cef4c51b19b0b0e0396ade1128e7fe09642d1a91bd309b15dc4741608.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
b7aec41cef4c51b19b0b0e0396ade1128e7fe09642d1a91bd309b15dc4741608.exe
Resource
win10v2004-20240419-en
Target
b7aec41cef4c51b19b0b0e0396ade1128e7fe09642d1a91bd309b15dc4741608
Size
5.0MB
MD5
de14a62771c1d9636c00d7692b0cbcf8
SHA1
a511ca8011f162f3aeb7532b08e6b7e1310779a8
SHA256
b7aec41cef4c51b19b0b0e0396ade1128e7fe09642d1a91bd309b15dc4741608
SHA512
31f942843a967f6eb31e5f62e3d87db3be38d5bf13a716b216533eca3e52ca26f35268045a078e2c77b7eafa134fdedbfba882788c5077f39ae6972cd058b957
SSDEEP
98304:m7WohqxmDwIQpwTk1j0zouwZaMoR0C0s2CJHfjoSd:m7mmnQqT+Z0MoRV07O
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\vmagent_new\bin\joblist\771324\out\Release\QHSafeMain.pdb
inet_ntoa
ntohs
htons
htonl
select
ntohl
InternetCloseHandle
HttpQueryInfoW
InternetReadFile
InternetSetOptionW
InternetOpenW
DeleteUrlCacheEntryW
InternetOpenUrlW
FindCloseUrlCache
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
InternetQueryOptionW
InternetCrackUrlA
InternetGetConnectedState
LocalAlloc
CreateProcessW
GetExitCodeThread
GetModuleHandleA
FlushInstructionCache
MulDiv
InterlockedIncrement
RaiseException
CreateEventA
GetSystemTimeAsFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetTempPathW
GetTempFileNameW
CreateDirectoryW
CompareFileTime
ReleaseSemaphore
CreateSemaphoreW
lstrlenA
lstrcmpiA
MapViewOfFile
lstrcpyW
InitializeCriticalSectionAndSpinCount
GetLocalTime
GetPrivateProfileSectionNamesW
GetPrivateProfileSectionW
VerSetConditionMask
VerifyVersionInfoW
FlushViewOfFile
OpenFileMappingW
GetFileSizeEx
GetCurrentDirectoryW
SetCurrentDirectoryW
GetLongPathNameW
GetFileAttributesExA
SetFileAttributesA
DeleteFileA
FreeConsole
GlobalFree
GetTimeZoneInformation
GlobalAlloc
GlobalLock
GlobalUnlock
GetCommandLineW
OpenEventW
GetComputerNameExW
CreateFileA
GetStartupInfoW
QueryPerformanceFrequency
QueryPerformanceCounter
FindFirstChangeNotificationW
FindNextChangeNotification
FindCloseChangeNotification
lstrcmpW
GlobalHandle
TerminateProcess
SetErrorMode
ExitProcess
LocalFileTimeToFileTime
IsBadReadPtr
GetFileTime
InterlockedExchangeAdd
CreateMutexA
GetCurrentThread
SleepEx
ReadProcessMemory
GetModuleFileNameA
GetDriveTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCurrentDirectoryA
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetConsoleMode
GetConsoleCP
GetStartupInfoA
GetFileType
SetHandleCount
GetStdHandle
HeapCreate
GetDateFormatA
GetTimeFormatA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
CompareStringA
CompareStringW
GetStringTypeW
LCMapStringW
LCMapStringA
RtlUnwind
GetCPInfo
ExitThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapSize
HeapReAlloc
HeapDestroy
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenMutexW
UnmapViewOfFile
MapViewOfFileEx
CreateFileMappingW
SetEndOfFile
FlushFileBuffers
GetCurrentThreadId
FreeResource
GetFileAttributesExW
lstrcmpiW
GetSystemInfo
GetSystemPowerStatus
GlobalMemoryStatus
GlobalMemoryStatusEx
HeapFree
GetProcessHeap
HeapAlloc
WideCharToMultiByte
GetCurrentProcess
lstrlenW
SetLastError
ProcessIdToSessionId
LoadLibraryA
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
LoadLibraryExW
MultiByteToWideChar
ReleaseMutex
CreateMutexW
GetCurrentProcessId
GetLogicalDriveStringsW
DeviceIoControl
MoveFileExW
SetFileAttributesW
RemoveDirectoryW
GetFileAttributesW
ExpandEnvironmentStringsW
SystemTimeToFileTime
GetSystemTime
GetDiskFreeSpaceExW
GetSystemDirectoryW
GetSystemWindowsDirectoryW
GetFileSize
GetPrivateProfileIntW
WritePrivateProfileStringW
GetDriveTypeW
GetWindowsDirectoryW
CreateThread
ResetEvent
GetShortPathNameW
OpenProcess
InterlockedDecrement
InterlockedExchange
FindClose
FindNextFileW
FindFirstFileW
ResumeThread
SetEvent
CreateEventW
InterlockedCompareExchange
Sleep
InitializeCriticalSection
DeleteCriticalSection
GetTickCount
LocalFree
GetLastError
WaitForMultipleObjects
WaitForSingleObject
GetVersionExW
GetModuleHandleW
GetModuleFileNameW
ReadFile
SetFilePointer
GetPrivateProfileStringW
EnterCriticalSection
FreeLibrary
LeaveCriticalSection
GetProcAddress
LoadLibraryW
WriteFile
DeleteFileW
GetVersion
CreateFileW
CloseHandle
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
SetEnvironmentVariableA
SetFilePointerEx
OutputDebugStringW
HeapUnlock
OpenThread
HeapLock
HeapWalk
OpenEventA
SetWaitableTimer
CreateWaitableTimerA
lstrcmpA
SetEnvironmentVariableW
WaitForInputIdle
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
UnregisterClassA
SetWindowLongW
GetWindowLongW
DefWindowProcW
CallWindowProcW
GetDC
ReleaseDC
KillTimer
DestroyWindow
SendMessageW
SetTimer
RegisterClassExW
SetWindowPlacement
SetLayeredWindowAttributes
EnumChildWindows
SetScrollInfo
GetScrollInfo
SetScrollPos
GetDlgCtrlID
HideCaret
UpdateLayeredWindow
PostQuitMessage
PeekMessageW
MapDialogRect
SetWindowContextHelpId
CreateDialogIndirectParamW
GetWindowTextLengthW
GetWindowTextW
BeginPaint
EndPaint
IsChild
GetFocus
GetClassNameW
GetSysColor
CharNextW
RedrawWindow
CreateAcceleratorTableW
SetCapture
ReleaseCapture
FillRect
InvalidateRgn
DestroyAcceleratorTable
GetKeyState
SetClassLongW
GetClassLongW
SetCursor
MoveWindow
GetCursorPos
SwitchToThisWindow
BringWindowToTop
IsIconic
EqualRect
InflateRect
CloseClipboard
GetClassInfoExW
LoadCursorW
CreateWindowExW
SetRectEmpty
SetClipboardData
EmptyClipboard
OpenClipboard
SystemParametersInfoW
GetWindowDC
IsRectEmpty
CopyRect
OffsetRect
FindWindowW
IsWindow
PostMessageW
LoadStringW
SendMessageTimeoutW
GetWindowPlacement
ShowWindow
GetSystemMetrics
SetRect
ScreenToClient
GetMessagePos
DrawTextW
SetWindowTextW
GetDlgItem
GetWindow
MonitorFromWindow
MapWindowPoints
IsDialogMessageW
DrawIconEx
EnableWindow
GetActiveWindow
MessageBoxW
UpdateWindow
InvalidateRect
SetWindowRgn
MonitorFromRect
LoadIconW
GetDesktopWindow
keybd_event
GetKeyboardState
SetActiveWindow
AttachThreadInput
GetParent
SetWindowPos
SetFocus
IsWindowEnabled
GetForegroundWindow
AllowSetForegroundWindow
GetMonitorInfoW
GetClientRect
DispatchMessageW
TranslateMessage
GetMessageW
PostThreadMessageW
FindWindowExW
LoadImageW
DestroyIcon
IntersectRect
PtInRect
GetWindowRect
SetForegroundWindow
ClientToScreen
RegisterWindowMessageW
GetObjectA
SetBkColor
ExtTextOutW
GdiAlphaBlend
StretchBlt
SetViewportOrgEx
CombineRgn
CreateRectRgn
CreateDIBSection
GetStockObject
CreateSolidBrush
CreateRectRgnIndirect
SetStretchBltMode
GetPixel
SetTextColor
CreateBitmap
CreateFontW
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetTextExtentPoint32W
DeleteObject
GetTextMetricsW
SelectObject
GetObjectW
GetDeviceCaps
DeleteDC
GetOpenFileNameW
GetSaveFileNameW
RegDeleteValueW
CryptGenRandom
RevertToSelf
RegEnumKeyExA
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ImpersonateLoggedOnUser
RegQueryInfoKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyExA
RegQueryValueExA
CheckTokenMembership
CreateWellKnownSid
DuplicateToken
RegDeleteKeyW
RegCreateKeyA
GetSidSubAuthority
CreateProcessAsUserW
GetLengthSid
SetTokenInformation
DuplicateTokenEx
RegOpenKeyW
RegEnumValueW
RegEnumKeyExW
CryptReleaseContext
CryptAcquireContextW
OpenProcessToken
RegCreateKeyW
ConvertStringSidToSidW
LookupAccountSidW
FreeSid
GetTokenInformation
AllocateAndInitializeSid
EqualSid
ConvertSidToStringSidW
LookupPrivilegeValueW
AdjustTokenPrivileges
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetMalloc
SHBrowseForFolderW
ShellExecuteW
ord680
CommandLineToArgvW
ExtractIconExW
ord165
SHGetSpecialFolderPathW
SHGetFolderPathW
SHGetFileInfoW
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
CLSIDFromProgID
CLSIDFromString
StringFromGUID2
CoLoadLibrary
CreateStreamOnHGlobal
OleUninitialize
CoTaskMemAlloc
OleLockRunning
CoGetClassObject
OleInitialize
CoTaskMemRealloc
SysAllocStringLen
SysAllocStringByteLen
SysStringByteLen
SafeArrayUnlock
SafeArrayLock
SafeArrayRedim
SafeArrayDestroy
SafeArrayCreate
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
SafeArrayCopy
SafeArrayGetVartype
DispCallFunc
SysAllocString
SysFreeString
VariantClear
VariantInit
VariantTimeToSystemTime
SafeArrayPutElement
SysStringLen
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SystemTimeToVariantTime
VarDateFromStr
VarUI4FromStr
VariantChangeType
VarBstrCmp
PathCompactPathW
ColorRGBToHLS
ColorHLSToRGB
UrlGetPartW
StrStrA
PathIsRelativeW
StrStrW
StrCmpNIA
PathFindExtensionA
PathRemoveFileSpecA
PathStripPathW
PathAppendW
PathRemoveFileSpecW
PathCombineW
PathFileExistsW
SHGetValueW
ord437
PathStripToRootW
PathCombineA
PathFileExistsA
StrCmpW
PathRemoveBackslashW
SHSetValueA
SHDeleteValueA
ord12
SHGetValueA
SHDeleteKeyW
StrCmpNIW
StrStrIA
SHDeleteValueW
SHSetValueW
PathAddBackslashW
wnsprintfW
PathIsDirectoryW
StrChrW
StrCmpNW
StrStrIW
StrCmpIW
PathFindExtensionW
PathFindFileNameW
_TrackMouseEvent
InitCommonControlsEx
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
GetModuleFileNameExW
WTSEnumerateProcessesW
WTSFreeMemory
WTSQuerySessionInformationW
GetUserProfileDirectoryW
CreateEnvironmentBlock
DestroyEnvironmentBlock
DnsFree
DnsQuery_A
RpcStringBindingComposeW
NdrAsyncClientCall
RpcBindingFree
RpcStringFreeW
RpcAsyncCompleteCall
RpcAsyncInitializeHandle
RpcBindingFromStringBindingW
ImmDisableIME
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ