Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
0b244d0e3005b8c1227ec1d4211bdd3e3f9d908ea53319a524e8ba6eba50fb7b.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0b244d0e3005b8c1227ec1d4211bdd3e3f9d908ea53319a524e8ba6eba50fb7b.dll
Resource
win10v2004-20240508-en
Target
0b244d0e3005b8c1227ec1d4211bdd3e3f9d908ea53319a524e8ba6eba50fb7b.exe
Size
3.0MB
MD5
8e4a24d6e34a026b9ed15537d4fb3bd0
SHA1
c743b60ff104a255a0aacd91263fce5defe912f4
SHA256
0b244d0e3005b8c1227ec1d4211bdd3e3f9d908ea53319a524e8ba6eba50fb7b
SHA512
5124a5fddddf294c53881133a989ede875a190de1a4b1975567d4f3ea7887c4492e51ea22eb5ee5efc9f4b878e89a793e6f70f637f2db5d83d3c80198bf180ac
SSDEEP
49152:JfhMP494ET7OomlT6QGBQQIJKG36qVhAwEzOrQIJKG36qVKpQgIZWMB9pz/U:JfhMPIT3eF+qwupVmwlfwupVKGgqJc
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\jenkins_Trunk\workspace\CEN_Hive_QQPCDownload_ForDCom\qqpcmgr_proj\bin\Release\QQPCDownload.pdb
htonl
WSCEnumProtocols
WSCInstallProvider
WSCWriteProviderOrder
WSCDeinstallProvider
htons
ntohl
GetModuleFileNameExW
SetLastError
FlushInstructionCache
InterlockedDecrement
GetCurrentThreadId
RaiseException
WideCharToMultiByte
GetVersion
GetPrivateProfileStringW
LoadLibraryExW
WritePrivateProfileStringW
GetProcessTimes
SystemTimeToFileTime
OutputDebugStringW
CreateProcessW
SetFilePointer
OpenMutexW
GetFullPathNameW
GetCPInfo
CreateFileMappingW
MapViewOfFileEx
OpenFileMappingW
UnmapViewOfFile
lstrcpynW
HeapAlloc
GetProcessHeap
HeapFree
SearchPathW
TerminateProcess
SetUnhandledExceptionFilter
ReadProcessMemory
VirtualAllocEx
GetSystemTimeAsFileTime
GetTempPathW
MapViewOfFile
MoveFileW
MoveFileExW
GetExitCodeProcess
CreateDirectoryW
OpenThread
CreateThread
Module32FirstW
Module32NextW
CreateRemoteThread
ReleaseMutex
GetExitCodeThread
GetModuleHandleExW
ResumeThread
RemoveDirectoryW
GetSystemDefaultLangID
GetSystemInfo
LoadLibraryA
ResetEvent
InitializeCriticalSectionAndSpinCount
IsBadReadPtr
GetFileAttributesW
GetModuleFileNameA
lstrcmpiW
IsDebuggerPresent
TlsGetValue
CreateIoCompletionPort
TlsFree
PostQueuedCompletionStatus
TlsAlloc
GetQueuedCompletionStatus
TlsSetValue
OpenEventW
GetCurrentDirectoryW
LocalFileTimeToFileTime
SetFileTime
VirtualProtectEx
GetThreadContext
SetThreadContext
VirtualFree
VirtualAlloc
GlobalLock
CreateFileA
UnhandledExceptionFilter
FileTimeToSystemTime
FileTimeToLocalFileTime
ExitThread
HeapReAlloc
GetCommandLineA
GetVersionExA
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetModuleHandleA
GetACP
GetOEMCP
IsValidCodePage
HeapSize
HeapDestroy
HeapCreate
GetStdHandle
GetCurrentDirectoryA
lstrlenA
OpenProcess
GetTickCount
LeaveCriticalSection
InterlockedExchange
FreeResource
GetTimeZoneInformation
CompareStringA
CompareStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetHandleCount
EnterCriticalSection
DeleteCriticalSection
InterlockedCompareExchange
WaitForMultipleObjects
InitializeCriticalSection
TerminateThread
CreateMutexW
CreateEventW
DuplicateHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WaitForSingleObject
GetCommandLineW
SetEvent
SetDllDirectoryW
GetPrivateProfileIntW
InterlockedIncrement
Sleep
IsBadWritePtr
VirtualProtect
GetModuleHandleW
GetSystemDirectoryW
WriteProcessMemory
lstrlenW
GlobalAlloc
GetCurrentProcessId
Process32NextW
Process32FirstW
GetCurrentProcess
CreateToolhelp32Snapshot
GlobalFree
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
WriteFile
ReadFile
GetFileSize
MultiByteToWideChar
DeleteFileW
GetDiskFreeSpaceExW
CopyFileW
FreeLibrary
GetDriveTypeW
GetLogicalDrives
CloseHandle
DeviceIoControl
CreateFileW
GetVersionExW
GetLastError
GetProcAddress
LoadLibraryW
FindResourceW
GetModuleFileNameW
FindResourceExW
LoadResource
LockResource
SizeofResource
GetTempFileNameW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetDriveTypeA
SetEndOfFile
SetEnvironmentVariableA
IsProcessorFeaturePresent
GetThreadLocale
ExitProcess
VirtualQueryEx
GetLocalTime
GetFocus
GetWindowTextW
EndDialog
LoadImageW
GetDlgCtrlID
PtInRect
DrawIconEx
GetWindowTextLengthW
MsgWaitForMultipleObjects
CharUpperW
SetWindowsHookExW
SendMessageTimeoutW
CallNextHookEx
PostThreadMessageW
SetTimer
SetCursor
ReleaseCapture
IsWindowVisible
GetSystemMenu
SetCapture
LoadIconW
EndPaint
BeginPaint
SetWindowTextW
TrackPopupMenu
DestroyIcon
KillTimer
DrawFrameControl
EqualRect
IsWindowEnabled
GetQueueStatus
DestroyWindow
UnregisterClassW
GetDesktopWindow
GetWindow
ReleaseDC
UnhookWindowsHookEx
GetForegroundWindow
GetWindowThreadProcessId
FindWindowW
FindWindowExW
wsprintfW
IsIconic
FindWindowA
MsgWaitForMultipleObjectsEx
GetSysColor
PostQuitMessage
GetDC
GetParent
ClientToScreen
GetClientRect
InvalidateRect
GetWindowRect
SystemParametersInfoW
GetKeyState
SetWindowPos
DispatchMessageW
ShowWindow
TranslateMessage
RegisterClassExW
GetMessageW
OffsetRect
PeekMessageW
SetWindowLongW
InflateRect
LoadCursorW
CallWindowProcW
GetClassInfoExW
SetRect
SetActiveWindow
MapWindowPoints
DefWindowProcW
GetMonitorInfoW
SendMessageW
CopyRect
MonitorFromWindow
GetWindowLongW
GetActiveWindow
GetDlgItem
RegisterWindowMessageW
EnableWindow
SetWindowRgn
CharNextW
WaitMessage
CreateWindowExW
MoveWindow
PostMessageW
MessageBoxW
IsWindow
LoadStringW
CopyImage
UnregisterClassA
DrawTextW
Rectangle
DeleteObject
CreateCompatibleBitmap
SelectObject
SetBkColor
SetRectRgn
ExtTextOutW
OffsetRgn
DeleteDC
StretchBlt
CreatePen
CreateRectRgn
CombineRgn
CreateBitmap
SetTextColor
GetStockObject
GetObjectW
CreateCompatibleDC
BitBlt
CreateRectRgnIndirect
SaveDC
RestoreDC
GetClipRgn
SelectClipRgn
RoundRect
TextOutW
MoveToEx
GetTextExtentPoint32W
LineTo
RectInRegion
SetBkMode
GetCurrentObject
CreateFontIndirectW
CreateDIBSection
CreateSolidBrush
RegSetValueExW
RegCreateKeyExW
RegEnumKeyExW
RegDeleteValueW
RegQueryValueExW
RegCloseKey
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegOpenKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetUserNameW
RegQueryInfoKeyW
StartServiceW
DeleteService
ChangeServiceConfig2W
CreateServiceW
CloseServiceHandle
RegDeleteKeyW
OpenSCManagerW
OpenServiceW
QueryServiceStatus
SHCreateDirectoryExW
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteW
Shell_NotifyIconW
SHGetSpecialFolderPathW
CoInitialize
CoCreateGuid
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
StringFromGUID2
CLSIDFromProgID
CoInitializeEx
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoFreeLibrary
CoLoadLibrary
CreateStreamOnHGlobal
CoTaskMemFree
SysStringLen
SysAllocStringByteLen
VarUI4FromStr
SysAllocString
SysFreeString
SysStringByteLen
VarBstrCmp
OleLoadPicture
PathCombineW
PathAppendW
PathFileExistsW
StrToIntA
PathRemoveExtensionW
PathAddExtensionW
PathQuoteSpacesW
PathRemoveFileSpecW
PathAddBackslashW
PathFindFileNameW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Netbios
NetApiBufferFree
NetWkstaTransportEnum
_TrackMouseEvent
GdipCreateFromHDC
GdipSetImageAttributesColorMatrix
GdipDeleteGraphics
GdiplusShutdown
GdipDrawImageRectRectI
GdiplusStartup
GdipGetImageHeight
GdipDisposeImage
GdipFree
GdipAlloc
GdipLoadImageFromStream
GdipCreateBitmapFromStream
GdipCloneImage
GdipDrawImageI
GdipGetImageWidth
GdipDrawImageRectI
GdipCreateHBITMAPFromBitmap
GdipDisposeImageAttributes
GdipCreateImageAttributes
UuidCreate
InternetOpenUrlW
InternetGetConnectedState
HttpQueryInfoW
InternetReadFile
InternetCloseHandle
InternetOpenW
CreateTxdlController
EntryPoint
TxDl_AsyncStartDownload
TxDl_Finalize
TxDl_GetChildLaucherParam
TxDl_GetCurrentLaucherIndex
TxDl_GetLaucher
TxDl_InitDownloadEngine
TxDl_Initialize
TxDl_IsDownloading
TxDl_LoadRoutine
TxDl_Main
TxDl_NotifyQuit
TxDl_RegisterCompleteEvent
TxDl_ReleaseLaucher
Txdl_GetVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ