Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
Force the Venom/Bunifu_UI_v1.5.3.dll
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
Force the Venom/ForceVenom-cracked.exe
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
Force the Venom/MaterialSkin.dll
Resource
win10-20230220-en
Target
Force_the_Venom.rar
Size
571KB
MD5
46b42d08e9d4c486f288f6dcc2389ac5
SHA1
20c012dd9ee92c80b030a034a07ecdb3e03bd82d
SHA256
13e6bbeb2df9402115f83badabbd1c8afac72e0c48ae6a015c3db35f5171c1c7
SHA512
d0bacee49f1ee5654382058d30679ff802f49adb84bff3693129c8bed261c6b999c225ff93008dad11cb187e9770d4782455fee542911cb3defa792891173ce4
SSDEEP
12288:qBwPbnEDPGSFpSTuTEjdTA1bpfQqar64Rj6qkpE3FrLfK/h:ywPbnEDRRAjdTsbpfQ423FrLCh
Checks for missing Authenticode signature.
resource |
---|
unpack001/Force the Venom/Bunifu_UI_v1.5.3.dll |
unpack001/Force the Venom/ForceVenom-cracked.exe |
unpack001/Force the Venom/MaterialSkin.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
RaiseException
DecodePointer
CreateEventA
WideCharToMultiByte
MultiByteToWideChar
DeleteFileW
GetModuleHandleW
OpenEventW
CreateEventW
CreateMutexW
lstrcmpW
CloseHandle
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetLastError
GetProcessHeap
HeapSize
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetEndOfFile
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
GetStdHandle
ExitProcess
SetFilePointerEx
GetFileType
ReadFile
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
HeapFree
HeapReAlloc
HeapAlloc
GetCommandLineW
GetCommandLineA
LoadLibraryExW
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
EncodePointer
OutputDebugStringW
HeapDestroy
GetProcAddress
LocalFree
FormatMessageA
LockResource
FreeLibrary
LoadResource
SizeofResource
LoadLibraryW
FindResourceW
FindResourceExW
CreateDirectoryW
CreateFileW
GetFileAttributesW
GetVersionExW
GetCurrentThreadId
FindClose
FormatMessageW
FindFirstFileW
FindNextFileW
CopyFileW
GetSystemTime
GetTempPathW
WaitForSingleObjectEx
VerSetConditionMask
InterlockedIncrement
InterlockedDecrement
OpenProcess
GetCurrentProcess
TerminateProcess
GetCurrentThread
Sleep
GetLocalTime
CompareFileTime
GetTickCount
MapViewOfFile
UnmapViewOfFile
lstrlenW
CreateFileMappingW
GetModuleFileNameW
CreateProcessW
GetDiskFreeSpaceExW
RemoveDirectoryW
SetFileAttributesW
VerifyVersionInfoW
GetGeoInfoW
GetUserGeoID
GetSystemTimeAsFileTime
CreateSemaphoreA
ReleaseSemaphore
DuplicateHandle
GetModuleHandleA
InterlockedExchange
InterlockedExchangeAdd
InterlockedCompareExchange
TerminateThread
SetLastError
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
QueueUserAPC
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SleepEx
SetWaitableTimer
GetShortPathNameW
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
SystemTimeToFileTime
FileTimeToSystemTime
QueryPerformanceCounter
QueryPerformanceFrequency
OpenEventA
WaitForMultipleObjectsEx
GetCurrentProcessId
ResumeThread
CreateWaitableTimerW
GetFileSizeEx
GetFileAttributesExW
GetExitCodeProcess
WriteFile
GetFileTime
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
lstrcmpiW
lstrcpyW
lstrcatW
IsDebuggerPresent
GetParent
GetWindowLongW
GetWindowRect
InvalidateRect
ShowWindow
CreateWindowExW
CallWindowProcW
DefWindowProcW
SendMessageW
MessageBoxA
AllowSetForegroundWindow
CharNextW
CharUpperW
SetWindowLongW
KillTimer
GetWindowTextW
SetForegroundWindow
IsWindowVisible
PostMessageW
LoadBitmapW
LoadIconW
FillRect
EndPaint
BeginPaint
ReleaseDC
GetDC
GetSystemMetrics
GetMessageW
TranslateMessage
DispatchMessageW
PostThreadMessageW
SetWindowPos
SetFocus
LoadAcceleratorsW
TranslateAcceleratorW
SetWindowTextW
MessageBoxW
EnumWindows
GetWindowThreadProcessId
PostQuitMessage
EnableWindow
DestroyWindow
GetDlgItem
SetTimer
RegisterClassW
GetStockObject
SelectObject
CreatePen
CreateFontW
SetTextColor
GetDeviceCaps
Rectangle
CreateSolidBrush
DeleteObject
SetBkMode
CopySid
RegOpenKeyExW
RegCloseKey
GetUserNameW
CheckTokenMembership
RegDeleteKeyW
RegEnumKeyExW
RegEnumValueW
RegFlushKey
RegQueryInfoKeyW
CryptAcquireContextW
RegCreateKeyExW
RegDeleteValueW
RegQueryValueExW
DuplicateToken
OpenProcessToken
OpenThreadToken
IsValidSid
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
GetLengthSid
RegSetValueExW
GetTokenInformation
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
ShellExecuteW
ShellExecuteExW
CommandLineToArgvW
SHGetFolderPathAndSubDirW
RegisterTypeLi
StrCpyW
StrRChrW
PathFileExistsW
StrCmpNW
SHDeleteKeyW
StrCmpW
StrStrW
PathAddBackslashW
StrDupW
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
IsNetworkAlive
UnloadUserProfile
socket
send
htons
freeaddrinfo
getaddrinfo
WSASocketW
WSASend
WSARecv
WSAGetLastError
WSASetLastError
WSACleanup
WSAStartup
setsockopt
select
getsockopt
ioctlsocket
connect
sendto
closesocket
HttpSendRequestExW
InternetQueryDataAvailable
InternetWriteFile
HttpEndRequestW
HttpSendRequestW
HttpAddRequestHeadersW
InternetOpenW
HttpQueryInfoW
InternetSetOptionW
InternetConnectW
InternetCloseHandle
InternetReadFile
HttpOpenRequestW
_TrackMouseEvent
InitCommonControlsEx
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateHBITMAPFromBitmap
GdipAlloc
GdipFree
timeBeginPeriod
timeSetEvent
timeGetDevCaps
timeGetTime
EnumProcesses
GetProcessImageFileNameW
GetAdaptersInfo
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
CoCreateGuid
CoCreateInstance
StringFromGUID2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ