Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
5a369884895ac65c19c9d97012d418a0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5a369884895ac65c19c9d97012d418a0N.dll
Resource
win10v2004-20240802-en
Target
5a369884895ac65c19c9d97012d418a0N.exe
Size
2.9MB
MD5
5a369884895ac65c19c9d97012d418a0
SHA1
81d6ae13c51f43c38451bea757b4afa31f7ecfe4
SHA256
60b1b309d8f1056b12efa9292a1fd5cff9bdbbf79a944b28f6b1cbd5a271cb5b
SHA512
41d4bd357bcf98a1555fc041b5fd7e3f318e4776bd8f5db58767e105f9f13f15134dfbe76d5ec1babb31fa0e0f81e8c3d3f9b02c756bb805d27bf5260ea6f167
SSDEEP
49152:PEujpV+oe5Nx6Tkxo0wJInHDvAwahZtYwJInHD3hQgIZq3tMgT:PEujr+vY0wJInHD4wAYwJInHD3egfvT
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\jenkins_Trunk\workspace\CEN_Hive_QQPCDownload_ForDCom\qqpcmgr_proj\bin\Release\QQPCDownload.pdb
htonl
WSCEnumProtocols
WSCInstallProvider
WSCWriteProviderOrder
WSCDeinstallProvider
htons
ntohl
GetModuleFileNameExW
DuplicateHandle
CreateEventW
CreateMutexW
InitializeCriticalSection
TerminateThread
WaitForMultipleObjects
InterlockedCompareExchange
DeleteCriticalSection
EnterCriticalSection
WritePrivateProfileStringW
GetCPInfo
CreateFileMappingW
MapViewOfFileEx
OpenFileMappingW
UnmapViewOfFile
GetProcessTimes
SystemTimeToFileTime
OutputDebugStringW
CreateProcessW
SetFilePointer
OpenMutexW
GetFullPathNameW
HeapFree
SearchPathW
TerminateProcess
SetUnhandledExceptionFilter
ReadProcessMemory
VirtualAllocEx
lstrcpynW
HeapAlloc
GetProcessHeap
GetSystemTimeAsFileTime
GetExitCodeProcess
CreateDirectoryW
OpenThread
CreateThread
Module32FirstW
Module32NextW
CreateRemoteThread
ReleaseMutex
GetExitCodeThread
GetModuleHandleExW
ResumeThread
GetTempPathW
MapViewOfFile
MoveFileW
MoveFileExW
GetTempFileNameW
RemoveDirectoryW
GetSystemDefaultLangID
GetSystemInfo
LoadLibraryA
ResetEvent
InitializeCriticalSectionAndSpinCount
IsBadReadPtr
GetModuleFileNameA
GetCommandLineW
GetFileAttributesW
IsDebuggerPresent
TlsGetValue
CreateIoCompletionPort
TlsFree
PostQueuedCompletionStatus
TlsAlloc
GetQueuedCompletionStatus
TlsSetValue
OpenEventW
GetCurrentDirectoryW
LocalFileTimeToFileTime
SetFileTime
VirtualProtectEx
GetThreadContext
SetThreadContext
VirtualFree
VirtualAlloc
CreateFileA
UnhandledExceptionFilter
FileTimeToSystemTime
FileTimeToLocalFileTime
HeapReAlloc
ExitThread
GetCommandLineA
GetVersionExA
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetModuleHandleA
GetACP
GetOEMCP
IsValidCodePage
HeapSize
HeapDestroy
HeapCreate
GetStdHandle
GetCurrentDirectoryA
WaitForSingleObject
SetDllDirectoryW
SetEvent
GetPrivateProfileIntW
LoadLibraryExW
GetPrivateProfileStringW
GetConsoleCP
GetConsoleMode
CompareStringA
CompareStringW
GetTimeZoneInformation
FlushFileBuffers
SetHandleCount
GetVersion
WideCharToMultiByte
RaiseException
InterlockedDecrement
FlushInstructionCache
GetCurrentThreadId
SetLastError
lstrcmpiW
lstrlenA
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
OpenProcess
GetTickCount
InterlockedExchange
LeaveCriticalSection
FreeResource
InterlockedIncrement
Sleep
IsBadWritePtr
VirtualProtect
GetModuleHandleW
GetSystemDirectoryW
WriteProcessMemory
lstrlenW
GlobalAlloc
GetCurrentProcessId
Process32NextW
Process32FirstW
GetCurrentProcess
CreateToolhelp32Snapshot
GlobalFree
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
WriteFile
ReadFile
GetFileSize
MultiByteToWideChar
DeleteFileW
GetDiskFreeSpaceExW
CopyFileW
FreeLibrary
GetDriveTypeW
GetLogicalDrives
CloseHandle
DeviceIoControl
CreateFileW
GetVersionExW
GetLastError
GetProcAddress
LoadLibraryW
FindResourceW
GetModuleFileNameW
FindResourceExW
LoadResource
LockResource
SizeofResource
GlobalLock
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetDriveTypeA
SetEndOfFile
SetEnvironmentVariableA
IsProcessorFeaturePresent
GetThreadLocale
ExitProcess
VirtualQueryEx
GetLocalTime
GetFocus
GetWindowTextW
GetWindowTextLengthW
EndDialog
LoadIconW
EndPaint
BeginPaint
SetWindowTextW
TrackPopupMenu
GetSysColor
MsgWaitForMultipleObjects
CharUpperW
GetForegroundWindow
GetWindowThreadProcessId
DestroyIcon
KillTimer
DrawFrameControl
DrawTextW
EqualRect
LoadImageW
GetDlgCtrlID
PtInRect
DrawIconEx
PostThreadMessageW
SetTimer
SetCursor
ReleaseCapture
IsWindowVisible
GetSystemMenu
CallWindowProcW
GetQueueStatus
GetClassInfoExW
UnregisterClassW
SetActiveWindow
MapWindowPoints
DefWindowProcW
GetMonitorInfoW
SetWindowsHookExW
FindWindowW
SendMessageTimeoutW
CallNextHookEx
FindWindowExW
wsprintfW
UnhookWindowsHookEx
IsIconic
FindWindowA
MsgWaitForMultipleObjectsEx
PostQuitMessage
SendMessageW
GetWindowLongW
CopyRect
GetActiveWindow
MonitorFromWindow
GetDlgItem
RegisterWindowMessageW
SetWindowRgn
CreateWindowExW
EnableWindow
MoveWindow
PostMessageW
IsWindowEnabled
CharNextW
DestroyWindow
IsWindow
GetWindow
GetDesktopWindow
ReleaseDC
GetDC
GetParent
ClientToScreen
GetClientRect
InvalidateRect
GetWindowRect
GetKeyState
SystemParametersInfoW
SetWindowPos
DispatchMessageW
ShowWindow
TranslateMessage
RegisterClassExW
GetMessageW
SetWindowLongW
OffsetRect
LoadCursorW
WaitMessage
PeekMessageW
InflateRect
MessageBoxW
SetRect
CopyImage
LoadStringW
UnregisterClassA
SetCapture
CreateBitmap
SetTextColor
GetStockObject
GetObjectW
CreateFontIndirectW
BitBlt
CreateDIBSection
CreateCompatibleDC
DeleteObject
Rectangle
CreateCompatibleBitmap
SelectObject
SetBkColor
ExtTextOutW
SetRectRgn
DeleteDC
OffsetRgn
CombineRgn
CreatePen
CreateRectRgnIndirect
SaveDC
RestoreDC
GetCurrentObject
CreateSolidBrush
GetClipRgn
SelectClipRgn
RoundRect
TextOutW
MoveToEx
GetTextExtentPoint32W
LineTo
RectInRegion
SetBkMode
StretchBlt
CreateRectRgn
RegSetValueExW
RegCreateKeyExW
RegEnumKeyExW
RegDeleteValueW
RegQueryValueExW
RegCloseKey
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegOpenKeyW
InitializeSecurityDescriptor
GetUserNameW
SetSecurityDescriptorDacl
RegQueryInfoKeyW
StartServiceW
DeleteService
ChangeServiceConfig2W
CreateServiceW
CloseServiceHandle
RegDeleteKeyW
OpenSCManagerW
OpenServiceW
QueryServiceStatus
SHCreateDirectoryExW
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListW
Shell_NotifyIconW
SHGetSpecialFolderPathW
CoInitialize
CoCreateGuid
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
StringFromGUID2
CLSIDFromProgID
CoGetInterfaceAndReleaseStream
CoInitializeEx
CoMarshalInterThreadInterfaceInStream
CoFreeLibrary
CoLoadLibrary
CreateStreamOnHGlobal
CoCreateInstance
SysStringLen
SysAllocStringByteLen
VarUI4FromStr
SysAllocString
SysFreeString
SysStringByteLen
VarBstrCmp
OleLoadPicture
StrToIntA
PathCombineW
PathRemoveExtensionW
PathFileExistsW
PathAddExtensionW
PathAppendW
PathRemoveFileSpecW
PathQuoteSpacesW
PathFindFileNameW
PathAddBackslashW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Netbios
NetApiBufferFree
NetWkstaTransportEnum
_TrackMouseEvent
GdipDisposeImageAttributes
GdipDeleteGraphics
GdipDrawImageRectI
GdipSetImageAttributesColorMatrix
GdiplusStartup
GdipCreateHBITMAPFromBitmap
GdipCreateImageAttributes
GdipDisposeImage
GdipFree
GdipAlloc
GdipLoadImageFromStream
GdipCreateBitmapFromStream
GdipCloneImage
GdipDrawImageI
GdiplusShutdown
GdipCreateFromHDC
GdipGetImageHeight
GdipGetImageWidth
GdipDrawImageRectRectI
UuidCreate
HttpQueryInfoW
InternetCloseHandle
InternetReadFile
InternetGetConnectedState
InternetOpenW
InternetOpenUrlW
CreateTxdlController
EntryPoint
TxDl_AsyncStartDownload
TxDl_Finalize
TxDl_GetChildLaucherParam
TxDl_GetCurrentLaucherIndex
TxDl_GetLaucher
TxDl_InitDownloadEngine
TxDl_Initialize
TxDl_IsDownloading
TxDl_LoadRoutine
TxDl_Main
TxDl_NotifyQuit
TxDl_RegisterCompleteEvent
TxDl_ReleaseLaucher
Txdl_GetVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ