Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
BulletsPassView.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
BulletsPassView.exe
Resource
win10v2004-20220812-en
Target
BulletsPassView.exe
Size
70KB
MD5
e40c9293ea0b6d62a0f62f40212df07b
SHA1
08edc669c2a5408cdbc3968fc4ac0a2f23ed69ba
SHA256
b19dfe440e515c39928b475a946656a12b1051e98e0df36c016586b34a766d5c
SHA512
6eb169f810092de15a9d54ab40ab61afc3ad37d4adb6ecb4d97a4f349e1a24ab0b62251b54db88f91cbc993d0626e34c738e054eed5a6e23cace669f9f01a975
SSDEEP
1536:BnRurS9FJgUN0jDEd0HVVMdhQu+w8abwt72+hmb:Bn9FJgMuDf0n+w8akt725
resource | yara_rule |
---|---|
sample | Nirsoft |
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
strcpy
_wcslwr
strlen
qsort
_purecall
_itow
__p__commode
__p__fmode
__set_app_type
_controlfp
_except_handler3
wcsrchr
_wcsicmp
malloc
wcschr
free
modf
_memicmp
_wtoi
memcmp
wcstoul
??2@YAPAXI@Z
??3@YAXPAX@Z
wcslen
memcpy
wcscmp
wcscpy
memset
_snwprintf
wcscat
wcsncat
ImageList_Create
ImageList_SetImageCount
ImageList_AddMasked
CreateStatusWindowW
CreateToolbarEx
ord17
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
CreateRemoteThread
EnumResourceTypesW
WriteProcessMemory
OpenProcess
GetCurrentProcess
ExitProcess
GetCurrentProcessId
ResumeThread
WaitForSingleObject
VirtualFreeEx
Sleep
VirtualAllocEx
GetModuleHandleA
GetStartupInfoW
GetProcAddress
ReadProcessMemory
DeleteFileW
SetErrorMode
GetStdHandle
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
CompareFileTime
FreeLibrary
LoadLibraryW
FileTimeToSystemTime
GetModuleFileNameW
WriteFile
LocalFree
CreateFileW
LockResource
FindResourceW
lstrcpyW
LoadResource
GlobalAlloc
lstrlenW
LoadLibraryExW
WideCharToMultiByte
GlobalUnlock
GetTempPathW
GetLastError
SizeofResource
GlobalLock
FormatMessageW
GetDateFormatW
GetTempFileNameW
GetVersionExW
GetFileSize
GetModuleHandleW
GetTimeFormatW
CloseHandle
GetFileAttributesW
GetWindowsDirectoryW
ReadFile
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileIntW
EnumResourceNamesW
EnumWindows
SendMessageTimeoutW
SetForegroundWindow
EndDeferWindowPos
SetCursor
LoadCursorW
GetSysColorBrush
ShowWindow
ChildWindowFromPoint
EndDialog
GetDlgItem
InvalidateRect
SetDlgItemInt
SetWindowTextW
GetClientRect
UpdateWindow
SetDlgItemTextW
GetSystemMetrics
DeferWindowPos
CreateWindowExW
GetWindowRect
GetDlgItemInt
SendDlgItemMessageW
SetMenu
SetWindowPos
GetWindowPlacement
LoadAcceleratorsW
PostMessageW
DefWindowProcW
SendMessageW
TranslateAcceleratorW
RegisterClassW
MessageBoxW
MessageBeep
GetWindowThreadProcessId
LoadImageW
SetWindowLongW
GetWindowLongW
SetFocus
EnableWindow
MapWindowPoints
GetMenu
GetSubMenu
GetDC
EmptyClipboard
EnableMenuItem
ReleaseDC
GetClassNameW
OpenClipboard
MoveWindow
GetMenuItemCount
GetMenuStringW
CheckMenuItem
CloseClipboard
GetCursorPos
GetSysColor
SetClipboardData
GetParent
GetWindowTextW
LoadMenuW
ModifyMenuW
GetMenuItemInfoW
DialogBoxParamW
GetDlgCtrlID
DestroyMenu
DestroyWindow
CreateDialogParamW
EnumChildWindows
LoadStringW
DestroyIcon
LoadIconW
KillTimer
BeginDeferWindowPos
RegisterWindowMessageW
TrackPopupMenu
PostQuitMessage
GetMessageW
SetTimer
IsDialogMessageW
TranslateMessage
DispatchMessageW
DrawTextExW
CreateFontIndirectW
SetBkMode
DeleteObject
SetTextColor
GetTextExtentPoint32W
SetBkColor
GetStockObject
GetDeviceCaps
SelectObject
ChooseFontW
FindTextW
GetSaveFileNameW
Shell_NotifyIconW
SHGetFileInfoW
ShellExecuteW
ShellExecuteExW
CoUninitialize
CoCreateInstance
CoInitialize
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ