Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
360QMachine.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
360QMachine.exe
Resource
win10v2004-20240419-en
Target
360QMachine.exe
Size
679KB
MD5
76e28ebaefe5bd44f6285c9209a958ee
SHA1
42bd3349d79d347f9e718af8c226f8276594083d
SHA256
2a49fac088492090b64252531347b6f470ae518840f95b9dc05a73a9d2747816
SHA512
838b9bc03157384d671ca01ab746a0ffabb03349f1374375999f6465ac87e30ad052b56773e2b36b728777049337d54c3708fbdd031eb0cc6c6a58bee6f53240
SSDEEP
12288:YFnkRo2g6YKeIqqQgwyTdGa83yc4doD5pQRh/vKVMq5uxcEqfxQx2+:qKgQYyEaEnDQRhKVx5P
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\building\360project\360sd\branches\360QMachine\360QMachine\Release\360QMachine.pdb
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
lstrcmpiW
CreateThread
GetVersion
GetVersionExW
GetModuleHandleA
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
lstrcmpW
QueryDosDeviceW
GetLogicalDriveStringsW
LoadLibraryA
GetLongPathNameW
WideCharToMultiByte
AreFileApisANSI
GetACP
ProcessIdToSessionId
GetCurrentProcessId
GetTickCount
FindClose
FindFirstFileW
FindNextFileW
Thread32Next
SuspendThread
OpenThread
Thread32First
ResumeThread
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
CopyFileW
GetTempPathW
ReadProcessMemory
MultiByteToWideChar
ReadFile
CreateFileW
CreateDirectoryW
RemoveDirectoryW
DeleteFileW
SetFileAttributesW
TlsSetValue
TlsGetValue
InterlockedCompareExchange
TlsFree
GetFileAttributesExW
CreateMutexW
SystemTimeToFileTime
FileTimeToSystemTime
GetPrivateProfileSectionW
GetFileSize
WritePrivateProfileStringW
GetWindowsDirectoryW
GetTimeZoneInformation
GetFileAttributesW
MoveFileExW
SetEnvironmentVariableW
WritePrivateProfileSectionW
GetPrivateProfileStringW
InitializeCriticalSection
Module32NextW
Module32FirstW
lstrlenA
DebugBreak
OutputDebugStringW
SetFilePointer
DeviceIoControl
SetCurrentDirectoryW
GetPrivateProfileIntW
LeaveCriticalSection
FreeLibrary
GlobalMemoryStatus
EnterCriticalSection
DeleteAtom
FindAtomW
AddAtomW
GetAtomNameW
GetSystemTime
LocalFree
GetLocalTime
FormatMessageW
GetFileSizeEx
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
InterlockedExchange
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
SetConsoleCtrlHandler
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringA
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
ExitProcess
HeapSize
HeapReAlloc
FatalAppExitA
HeapDestroy
HeapCreate
GetModuleFileNameA
GetStdHandle
HeapFree
InterlockedDecrement
lstrlenW
InterlockedIncrement
GetCurrentProcess
FlushInstructionCache
DeleteCriticalSection
RaiseException
GetCurrentThreadId
SetLastError
LoadLibraryW
GetProcAddress
GetModuleHandleW
ReleaseMutex
CreateMutexA
CloseHandle
Sleep
GetModuleFileNameW
GetLastError
OpenProcess
GetDriveTypeW
WriteFile
GetCurrentThread
TlsAlloc
IsValidCodePage
GetOEMCP
GetCPInfo
GetStartupInfoW
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
VirtualAlloc
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
TerminateProcess
GetClassInfoW
UnregisterClassA
CreateDialogParamW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
DestroyWindow
ShowWindow
IsDialogMessageW
RegisterClassW
FindWindowW
GetWindowThreadProcessId
SendMessageTimeoutW
DefWindowProcW
IsWindowVisible
IsIconic
LoadIconW
LoadImageW
SendMessageW
KillTimer
SetTimer
SetWindowTextW
MessageBoxW
PostQuitMessage
PtInRect
CopyRect
GetCursorPos
ScreenToClient
LoadCursorW
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
EndDialog
DialogBoxParamW
ExitWindowsEx
GetWindowLongW
GetParent
wvsprintfW
CharLowerW
BringWindowToTop
SwitchToThisWindow
SetWindowPos
EnumThreadWindows
SystemParametersInfoW
GetSystemMetrics
WindowFromPoint
SetForegroundWindow
WaitForInputIdle
CharLowerBuffW
PostMessageW
CharNextW
SetWindowLongW
LoadStringW
LookupPrivilegeValueW
GetTokenInformation
AllocateAndInitializeSid
IsValidSid
EqualSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
AdjustTokenPrivileges
RegQueryInfoKeyW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegQueryValueExA
ShellExecuteExW
SHChangeNotify
SHGetSpecialFolderPathW
ShellExecuteW
IIDFromString
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitialize
CoUninitialize
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SafeArrayCopy
SafeArrayGetVartype
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayDestroy
SafeArrayRedim
SafeArrayCreate
SafeArrayUnlock
SafeArrayLock
SysAllocStringLen
VariantCopy
VarUI4FromStr
VariantClear
VariantInit
DispCallFunc
CreateErrorInfo
GetErrorInfo
VariantChangeType
SetErrorInfo
SysFreeString
PathAppendW
PathCombineW
StrCmpNW
SHDeleteValueW
StrStrIW
PathFileExistsW
SHGetValueW
SHSetValueW
PathRemoveFileSpecW
PathAddBackslashW
StrCmpNIW
SHDeleteKeyW
InitCommonControlsEx
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
WTHelperProvDataFromStateData
WinVerifyTrust
CertGetNameStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ