Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
271d72945f783f7807cdac1acd1e2950N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
271d72945f783f7807cdac1acd1e2950N.dll
Resource
win10v2004-20240802-en
Target
271d72945f783f7807cdac1acd1e2950N
Size
2.5MB
MD5
271d72945f783f7807cdac1acd1e2950
SHA1
8668aebd7c71962595bb0496926f0eb2df18dd8b
SHA256
2867fd3dad8044a405917cc308a45dcc5875b68e3a986e2f5016433af95c81fa
SHA512
46ffaae525a0ee235a34498277d158b46a88d31836d7a0bf2adedbd74cd5f24853e175b55d90f0afb9ff6684db9bb9f2ac710d6a05df1fb49272fef8a2c8903a
SSDEEP
49152:lLCMis09NyioTeIh+Aw4DTrTS1UQgIZs26Hb9H:lLC1FNJu9wEHTSng39H
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\jenkins_Trunk\workspace\CEN_Hive_QQPCDownload_ForDCom\qqpcmgr_proj\bin\Release\QQPCDownload.pdb
htonl
WSCEnumProtocols
WSCInstallProvider
WSCWriteProviderOrder
WSCDeinstallProvider
htons
ntohl
GetModuleFileNameExW
InterlockedDecrement
SetEvent
WaitForSingleObject
RaiseException
WideCharToMultiByte
GetPrivateProfileStringW
DuplicateHandle
CreateEventW
LoadLibraryExW
WritePrivateProfileStringW
GetProcessTimes
SystemTimeToFileTime
OutputDebugStringW
CreateProcessW
SetFilePointer
OpenMutexW
GetFullPathNameW
GetCPInfo
CreateFileMappingW
MapViewOfFileEx
OpenFileMappingW
UnmapViewOfFile
HeapFree
SearchPathW
TerminateProcess
SetUnhandledExceptionFilter
ReadProcessMemory
VirtualAllocEx
lstrcpynW
HeapAlloc
GetProcessHeap
GetSystemTimeAsFileTime
CreateRemoteThread
GetExitCodeThread
GetModuleHandleExW
ResumeThread
MapViewOfFile
ReleaseMutex
Module32FirstW
Module32NextW
GetTempPathW
GetExitCodeProcess
MoveFileW
CreateDirectoryW
OpenThread
CreateThread
MoveFileExW
GetTempFileNameW
RemoveDirectoryW
GetSystemDefaultLangID
GetSystemInfo
LoadLibraryA
ResetEvent
InitializeCriticalSectionAndSpinCount
IsBadReadPtr
GetLocalTime
GetModuleFileNameA
FlushInstructionCache
IsDebuggerPresent
TlsFree
PostQueuedCompletionStatus
TlsAlloc
GetQueuedCompletionStatus
TlsSetValue
TlsGetValue
CreateIoCompletionPort
GetCurrentDirectoryW
LocalFileTimeToFileTime
SetFileTime
VirtualAlloc
VirtualProtectEx
GetThreadContext
SetThreadContext
VirtualFree
CreateFileA
UnhandledExceptionFilter
FileTimeToSystemTime
FileTimeToLocalFileTime
ExitThread
HeapReAlloc
GetCommandLineA
GetVersionExA
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetModuleHandleA
GetACP
GetOEMCP
IsValidCodePage
HeapSize
HeapDestroy
HeapCreate
GetStdHandle
GetCurrentDirectoryA
CompareStringA
CompareStringW
GetVersion
lstrlenA
lstrcmpiW
GetCurrentThreadId
InterlockedExchange
OpenProcess
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
FlushFileBuffers
SetHandleCount
GetFileType
GetStartupInfoA
SetLastError
InterlockedCompareExchange
WaitForMultipleObjects
TerminateThread
GetTickCount
LeaveCriticalSection
FreeResource
EnterCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
DeleteCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
InitializeCriticalSection
GetCommandLineW
CreateMutexW
SetDllDirectoryW
GetPrivateProfileIntW
InterlockedIncrement
Sleep
IsBadWritePtr
VirtualProtect
GetModuleHandleW
GetSystemDirectoryW
WriteProcessMemory
lstrlenW
GlobalAlloc
GetCurrentProcessId
Process32NextW
Process32FirstW
GetCurrentProcess
CreateToolhelp32Snapshot
GlobalFree
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
WriteFile
ReadFile
GetFileSize
MultiByteToWideChar
DeleteFileW
GetDiskFreeSpaceExW
CopyFileW
FreeLibrary
GetDriveTypeW
GetLogicalDrives
CloseHandle
DeviceIoControl
CreateFileW
GetVersionExW
GetLastError
GetProcAddress
LoadLibraryW
FindResourceW
GetModuleFileNameW
FindResourceExW
LoadResource
LockResource
SizeofResource
GlobalLock
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetDriveTypeA
SetEndOfFile
SetEnvironmentVariableA
GetThreadLocale
IsProcessorFeaturePresent
VirtualQueryEx
GetFileAttributesW
ExitProcess
CharUpperW
MsgWaitForMultipleObjects
GetSysColor
GetFocus
GetWindowTextW
GetWindowTextLengthW
EndDialog
GetSystemMenu
SetCapture
LoadIconW
CallNextHookEx
wsprintfW
GetUserObjectInformationW
UnhookWindowsHookEx
CreateDesktopW
CloseDesktop
GetForegroundWindow
EndPaint
BeginPaint
SetWindowTextW
TrackPopupMenu
DestroyIcon
KillTimer
DrawFrameControl
DrawTextW
EqualRect
LoadImageW
GetDlgCtrlID
PtInRect
DrawIconEx
SetTimer
SetCursor
UnregisterClassW
IsWindowVisible
EnumWindows
EnableWindow
GetWindow
MoveWindow
PostMessageW
IsWindowEnabled
SetThreadDesktop
GetWindowThreadProcessId
FindWindowW
FindWindowExW
SetWindowsHookExW
SendMessageTimeoutW
IsIconic
FindWindowA
PostQuitMessage
GetQueueStatus
WaitMessage
CharNextW
DestroyWindow
IsWindow
GetKeyState
GetDesktopWindow
ReleaseDC
GetDC
SetWindowLongW
GetParent
ClientToScreen
GetClientRect
CallWindowProcW
InvalidateRect
GetWindowRect
SystemParametersInfoW
SetActiveWindow
SetWindowPos
DispatchMessageW
MapWindowPoints
DefWindowProcW
ShowWindow
TranslateMessage
RegisterClassExW
GetMessageW
GetWindowLongW
OffsetRect
GetActiveWindow
PeekMessageW
InflateRect
LoadCursorW
GetClassInfoExW
SetRect
SetWindowRgn
CreateWindowExW
GetMonitorInfoW
ReleaseCapture
MsgWaitForMultipleObjectsEx
SendMessageW
CopyRect
MonitorFromWindow
GetDlgItem
MessageBoxW
RegisterWindowMessageW
CopyImage
LoadStringW
UnregisterClassA
PostThreadMessageW
SetBkColor
ExtTextOutW
DeleteDC
Rectangle
StretchBlt
CreatePen
CreateRectRgn
CombineRgn
CreateBitmap
SetTextColor
SetRectRgn
OffsetRgn
GetStockObject
GetObjectW
CreateFontIndirectW
BitBlt
CreateDIBSection
SelectObject
DeleteObject
SaveDC
RestoreDC
GetClipRgn
SetBkMode
CreateRectRgnIndirect
GetCurrentObject
CreateSolidBrush
SelectClipRgn
RoundRect
TextOutW
MoveToEx
GetTextExtentPoint32W
LineTo
CreateCompatibleDC
CreateCompatibleBitmap
RectInRegion
RegDeleteValueW
RegQueryValueExW
RegCloseKey
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegOpenKeyW
GetUserNameW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryInfoKeyW
StartServiceW
DeleteService
ChangeServiceConfig2W
CreateServiceW
CloseServiceHandle
RegEnumKeyExW
RegCreateKeyExW
RegSetValueExW
RegDeleteKeyW
OpenSCManagerW
OpenServiceW
QueryServiceStatus
Shell_NotifyIconW
SHCreateDirectoryExW
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderPathW
CoInitialize
CoCreateGuid
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
StringFromGUID2
CLSIDFromProgID
CoInitializeEx
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoFreeLibrary
CoLoadLibrary
CreateStreamOnHGlobal
CoTaskMemFree
SysStringLen
SysAllocStringByteLen
VarUI4FromStr
SysAllocString
SysFreeString
SysStringByteLen
VarBstrCmp
OleLoadPicture
PathRemoveFileSpecW
PathCombineW
StrToIntA
PathFileExistsW
PathAppendW
PathRemoveExtensionW
PathAddExtensionW
PathQuoteSpacesW
PathFindFileNameW
PathAddBackslashW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Netbios
NetApiBufferFree
NetWkstaTransportEnum
_TrackMouseEvent
GdiplusStartup
GdipGetImageWidth
GdipCreateImageAttributes
GdipDisposeImageAttributes
GdipGetImageHeight
GdiplusShutdown
GdipDeleteGraphics
GdipDisposeImage
GdipFree
GdipAlloc
GdipLoadImageFromStream
GdipCreateBitmapFromStream
GdipCloneImage
GdipDrawImageI
GdipCreateFromHDC
GdipDrawImageRectRectI
GdipSetImageAttributesColorMatrix
GdipDrawImageRectI
GdipCreateHBITMAPFromBitmap
UuidCreate
InternetOpenW
InternetReadFile
InternetOpenUrlW
HttpQueryInfoW
InternetGetConnectedState
InternetCloseHandle
CreateTxdlController
EntryPoint
IsSupportNoReName
TxDl_AsyncStartDownload
TxDl_Finalize
TxDl_GetChildLaucherParam
TxDl_GetCurrentLaucherIndex
TxDl_GetLaucher
TxDl_InitDownloadEngine
TxDl_Initialize
TxDl_IsDownloading
TxDl_LoadRoutine
TxDl_Main
TxDl_NotifyQuit
TxDl_RegisterCompleteEvent
TxDl_ReleaseLaucher
Txdl_GetVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ