Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a9c6fe75a717063c30b0b8bfe69a8b4a9ecae9aaddc375eff99f8f67e24f7603.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a9c6fe75a717063c30b0b8bfe69a8b4a9ecae9aaddc375eff99f8f67e24f7603.exe
Resource
win10v2004-20240802-en
Target
a9c6fe75a717063c30b0b8bfe69a8b4a9ecae9aaddc375eff99f8f67e24f7603
Size
955KB
MD5
1a43d40b6f5181e6f571b8ee9d02a5cd
SHA1
3d3719baf1dac3f42d389e56a27c96aea6b39ea2
SHA256
a9c6fe75a717063c30b0b8bfe69a8b4a9ecae9aaddc375eff99f8f67e24f7603
SHA512
876cbe1998a3ca877fb954a2b63575c9aff191eb2b721c144491d8e401efe0d96a2762a55dd11a737d405f5c8a05aabc3c5e7a525694fd9d26831f2576fd2efa
SSDEEP
24576:SLwlwdBvjeMLkSKK97cnPU+9NaIIFUe3AUaFu1AyKa/lDHl:Qw+dBvMnPU+9NaII13AxsUatbl
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
D:\qci_workspace\root-workspaces\__qci-pipeline-10854701-1\app\Windows\output\x86\bin\Release\WeMeetApp.pdb
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetLongPathNameW
Process32FirstW
CreateToolhelp32Snapshot
WideCharToMultiByte
MultiByteToWideChar
SetDllDirectoryW
LocalFree
LoadLibraryA
LoadLibraryExW
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameW
GetCurrentProcessId
CreateMutexA
SetEvent
SetLastError
RaiseException
CloseHandle
OutputDebugStringA
GetTempPathW
SetCurrentDirectoryW
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
VirtualProtect
GetCurrentThreadId
GetCurrentThread
GetFileAttributesW
TerminateProcess
GetCurrentProcess
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
OutputDebugStringW
IsDebuggerPresent
LoadLibraryW
GetProcAddress
FreeLibrary
GetModuleHandleW
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
EnterCriticalSection
LeaveCriticalSection
FormatMessageA
QueryPerformanceCounter
QueryPerformanceFrequency
GetStringTypeW
GetLocaleInfoEx
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
SetFileInformationByHandle
GetFileInformationByHandleEx
EncodePointer
LCMapStringEx
GetCurrentProcessorNumber
GetSystemTimeAsFileTime
CompareStringEx
GetCPInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
InitializeSListHead
CreateIoCompletionPort
CreateEventW
CreateThread
ResetEvent
GetQueuedCompletionStatus
UnregisterWait
RegisterWaitForSingleObject
TerminateJobObject
PostQueuedCompletionStatus
WaitForSingleObject
GetModuleHandleExW
SetInformationJobObject
DuplicateHandle
GetUserDefaultLangID
GetUserDefaultLCID
GetUserDefaultLocaleName
EnumSystemLocalesEx
GetTickCount
TryAcquireSRWLockExclusive
UnregisterWaitEx
Sleep
IsWow64Process
GetSystemDirectoryW
SetThreadPriority
GetThreadPriority
GetFileType
SetHandleInformation
HeapSetInformation
SetProcessDEPPolicy
VirtualQueryEx
VirtualAllocEx
GetVersionExW
GetProductInfo
GetNativeSystemInfo
AssignProcessToJobObject
WriteProcessMemory
CreateFileMappingW
MapViewOfFile
ReadProcessMemory
SetThreadAffinityMask
VirtualFree
GetProcessHeaps
GetLocalTime
WriteFile
CreateNamedPipeW
QueryInformationJobObject
VirtualProtectEx
ExpandEnvironmentStringsW
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
CreateMutexW
UnmapViewOfFile
QueryDosDeviceW
VirtualFreeEx
GetProcessHandleCount
TlsGetValue
VirtualAlloc
lstrlenW
DebugBreak
TlsAlloc
TlsFree
TlsSetValue
SetFilePointerEx
ReadFile
GetFileSizeEx
SetEndOfFile
FlushFileBuffers
RtlCaptureStackBackTrace
CreateRemoteThread
GetSystemInfo
VirtualQuery
SetEnvironmentVariableW
GetLogicalProcessorInformation
InitializeConditionVariable
WakeConditionVariable
InitializeSRWLock
RtlUnwind
InitializeCriticalSectionAndSpinCount
ExitThread
ResumeThread
FreeLibraryAndExitThread
ExitProcess
GetStdHandle
GetConsoleCP
GetConsoleMode
SetStdHandle
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesW
ReadConsoleW
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
GetCommandLineW
GetThreadId
Process32NextW
SwitchToThread
IsProcessorFeaturePresent
CreateJobObjectW
CreateWindowStationW
GetProcessWindowStation
GetThreadDesktop
CloseWindowStation
MessageBoxW
GetDesktopWindow
SetWindowsHookExW
CallNextHookEx
wsprintfW
SetProcessWindowStation
CloseDesktop
GetUserObjectInformationW
PostThreadMessageW
EnumDisplayDevicesW
CreateDesktopW
SHCreateDirectoryExW
SHGetFolderPathW
CoReleaseServerProcess
CoCreateInstance
CoInitialize
CoTaskMemFree
CoAddRefServerProcess
CoUninitialize
SysFreeString
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VarBstrCmp
RevertToSelf
InitializeSid
GetSidSubAuthority
AdjustTokenPrivileges
LookupPrivilegeValueW
IsValidSid
GetLengthSid
CreateWellKnownSid
RegDisablePredefinedCache
ConvertStringSidToSidW
ConvertSidToStringSidW
EqualSid
CreateProcessAsUserW
SetThreadToken
SetTokenInformation
OpenProcessToken
GetSecurityDescriptorSacl
GetAce
SetKernelObjectSecurity
GetKernelObjectSecurity
DuplicateTokenEx
MapGenericMask
AccessCheck
FreeSid
ImpersonateLoggedOnUser
GetNamedSecurityInfoW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetSecurityInfo
SetSecurityInfo
BuildTrusteeWithSidW
SetEntriesInAclW
InitializeAcl
AddMandatoryAce
GetSecurityDescriptorDacl
SystemFunction036
RegCreateKeyExW
DuplicateToken
GetTokenInformation
CreateRestrictedToken
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
PathFindFileNameW
SymSetSearchPathW
SymInitialize
SymFromAddr
SymGetLineFromAddr64
SymSetOptions
SymGetSearchPathW
SymCleanup
timeGetTime
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ