Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
fff03726062458783f2f9351faa001e30457b375791109bb28b6148359bbd081.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fff03726062458783f2f9351faa001e30457b375791109bb28b6148359bbd081.exe
Resource
win10v2004-20240802-en
Target
fff03726062458783f2f9351faa001e30457b375791109bb28b6148359bbd081
Size
1.0MB
MD5
c7fa75bc0a1c6749e31c9f4216e01648
SHA1
18d20f637fc0a956d7be791dee37bae052173710
SHA256
fff03726062458783f2f9351faa001e30457b375791109bb28b6148359bbd081
SHA512
91bf1178c457bf4ed9a079b5710af3b6af4c91c53270cefc9b391c25df94d3f6b587d34c145b730ae676e8bdd1ad2a3ed5bca093f9473afff1c55617035bd060
SSDEEP
24576:O4BFF3BhLaSOo747tATgUnq45s+XfF4w0IC:DBFFx3Lrq4HfF58
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\qci_workspace\root-workspaces\__qci-pipeline-11017473-1\app\Windows\output\x64\bin\Release\WeMeetApp.pdb
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
GetLongPathNameW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
WideCharToMultiByte
SetDllDirectoryW
LocalFree
LoadLibraryA
LoadLibraryExW
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameW
GetCurrentProcessId
CreateMutexA
SetEvent
SetLastError
RaiseException
CloseHandle
OutputDebugStringA
GetTempPathW
SetCurrentDirectoryW
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
VirtualProtect
GetCurrentThreadId
GetCurrentThread
GetFileAttributesW
TerminateProcess
GetCurrentProcess
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
OutputDebugStringW
IsDebuggerPresent
LoadLibraryW
GetProcAddress
FreeLibrary
GetModuleHandleW
DeleteCriticalSection
InitializeCriticalSectionEx
EnterCriticalSection
LeaveCriticalSection
FormatMessageA
QueryPerformanceCounter
QueryPerformanceFrequency
GetStringTypeW
GetLocaleInfoEx
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
SetFileInformationByHandle
GetFileInformationByHandleEx
EncodePointer
LCMapStringEx
GetCurrentProcessorNumber
GetSystemTimeAsFileTime
CompareStringEx
GetCPInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
IsProcessorFeaturePresent
InitializeSListHead
CreateIoCompletionPort
CreateEventW
CreateThread
ResetEvent
GetQueuedCompletionStatus
RegisterWaitForSingleObject
UnregisterWait
TerminateJobObject
PostQueuedCompletionStatus
WaitForSingleObject
GetModuleHandleExW
SetInformationJobObject
DuplicateHandle
GetUserDefaultLangID
GetUserDefaultLCID
GetUserDefaultLocaleName
EnumSystemLocalesEx
GetTickCount
TryAcquireSRWLockExclusive
UnregisterWaitEx
Sleep
GetThreadId
SetThreadPriority
MultiByteToWideChar
GetFileType
SetHandleInformation
HeapSetInformation
GetVersionExW
GetProductInfo
GetNativeSystemInfo
IsWow64Process
AssignProcessToJobObject
WriteProcessMemory
CreateFileMappingW
MapViewOfFile
ReadProcessMemory
SetThreadAffinityMask
VirtualFree
GetProcessHeaps
GetLocalTime
WriteFile
CreateNamedPipeW
CreateJobObjectW
QueryInformationJobObject
VirtualAllocEx
VirtualProtectEx
RtlUnwind
ExpandEnvironmentStringsW
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
CreateMutexW
UnmapViewOfFile
QueryDosDeviceW
VirtualFreeEx
GetProcessHandleCount
TlsGetValue
VirtualAlloc
lstrlenW
DebugBreak
TlsAlloc
TlsFree
TlsSetValue
SetFilePointerEx
ReadFile
GetFileSizeEx
SetEndOfFile
FlushFileBuffers
RtlCaptureStackBackTrace
CreateRemoteThread
GetSystemInfo
GetLogicalProcessorInformation
InitializeConditionVariable
WakeConditionVariable
InitializeSRWLock
ResumeThread
RtlPcToFileHeader
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
ExitThread
FreeLibraryAndExitThread
ExitProcess
GetStdHandle
GetConsoleCP
GetConsoleMode
SetStdHandle
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesW
ReadConsoleW
SetEnvironmentVariableW
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
DecodePointer
GetCommandLineW
GetThreadPriority
GetSystemDirectoryW
SwitchToThread
GetStartupInfoW
CreateDesktopW
CreateWindowStationW
GetProcessWindowStation
GetThreadDesktop
CloseDesktop
MessageBoxW
GetDesktopWindow
EnumDisplayDevicesW
CloseWindowStation
SetProcessWindowStation
GetUserObjectInformationW
SetWindowsHookExW
CallNextHookEx
wsprintfW
PostThreadMessageW
SHCreateDirectoryExW
SHGetFolderPathW
CoReleaseServerProcess
CoAddRefServerProcess
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
SysStringByteLen
SysAllocStringByteLen
VarBstrCmp
SysAllocString
SysFreeString
RevertToSelf
InitializeSid
GetSidSubAuthority
IsValidSid
AdjustTokenPrivileges
GetLengthSid
CreateWellKnownSid
ConvertStringSidToSidW
ConvertSidToStringSidW
RegDisablePredefinedCache
EqualSid
CreateProcessAsUserW
SetThreadToken
SetTokenInformation
OpenProcessToken
GetSecurityDescriptorSacl
GetAce
SetKernelObjectSecurity
GetKernelObjectSecurity
DuplicateTokenEx
MapGenericMask
AccessCheck
FreeSid
ImpersonateLoggedOnUser
GetNamedSecurityInfoW
GetSecurityInfo
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SetSecurityInfo
BuildTrusteeWithSidW
SetEntriesInAclW
InitializeAcl
AddMandatoryAce
GetSecurityDescriptorDacl
RegCreateKeyExW
SystemFunction036
DuplicateToken
GetTokenInformation
CreateRestrictedToken
LookupPrivilegeValueW
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
PathFindFileNameW
SymSetOptions
SymSetSearchPathW
SymCleanup
SymFromAddr
SymGetSearchPathW
SymGetLineFromAddr64
SymInitialize
timeGetTime
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ