Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
MailPV.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
MailPV.exe
Resource
win10v2004-20230220-en
Target
MailPV.exe
Size
110KB
MD5
782dd6152ab52361eba2bafd67771fa0
SHA1
5c5ff30a24a3858a8e9bd531dfef885d0b2a00c7
SHA256
26a3395a4115355e897a7daf04551eba5e62da661d8dbae7c99205a2e74d24ba
SHA512
a6d22daa93cf5eb2e57684bc0e3e0c177e4a4fe0cf9e072cab188a99178892eff92241ad6d94b20da487d88ce65f2a3ffc4d6a4dc293bf375d94fbc6b0449f53
SSDEEP
3072:1WSVGdlouHiwfXjObBBDTn991ix689w2KQik:1Wrdl9fzOzTna689V
resource | yara_rule |
---|---|
sample | Nirsoft |
Password recovery tool for various email clients
resource | yara_rule |
---|---|
sample | MailPassView |
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
memmove
wcschr
wcslen
wcsncmp
_itoa
_strlwr
strncmp
_mbsnbicmp
_snprintf
_mbsrchr
__dllonexit
_onexit
_c_exit
_exit
_XcptFilter
_cexit
_strnicmp
_acmdln
__getmainargs
_initterm
_memicmp
malloc
strrchr
_stricmp
free
modf
memcmp
strtoul
??3@YAXPAX@Z
??2@YAPAXI@Z
memcpy
sprintf
_mbsicmp
atoi
_strcmpi
strlen
strcmp
exit
_adjust_fdiv
wcsstr
log
_mbscmp
strchr
_purecall
strncat
abs
strcat
_ultoa
strcpy
memset
__p__commode
__p__fmode
__set_app_type
_controlfp
_except_handler3
__setusermatherr
CreateToolbarEx
ImageList_Create
ImageList_AddMasked
ImageList_SetImageCount
ord17
ImageList_ReplaceIcon
ord6
UuidFromStringA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetModuleHandleA
ExitProcess
GetCurrentProcessId
ReadProcessMemory
GetCurrentProcess
GetStdHandle
GetPrivateProfileIntA
EnumResourceNamesA
WritePrivateProfileStringA
GetComputerNameA
GetFileSize
CreateFileA
GlobalUnlock
GlobalLock
GetTempPathA
GlobalAlloc
CloseHandle
FindResourceA
LoadResource
EnumResourceTypesA
SizeofResource
LockResource
DeleteFileA
OpenProcess
GetStartupInfoA
GetPrivateProfileStringA
MultiByteToWideChar
WideCharToMultiByte
ExpandEnvironmentStringsA
LocalFree
WriteFile
GetPrivateProfileSectionA
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleFileNameA
FindFirstFileA
FindNextFileA
SetFilePointer
GetLastError
LoadLibraryExA
GetFileAttributesA
GetTempFileNameA
FindClose
FormatMessageA
GetWindowsDirectoryA
ReadFile
GetVersionExA
GetClassNameA
TrackPopupMenu
PostMessageA
GetFocus
DispatchMessageA
DrawTextExA
IsDialogMessageA
GetMessageA
TranslateMessage
RegisterWindowMessageA
PostQuitMessage
GetWindowTextA
GetMenuItemInfoA
EnumChildWindows
DestroyMenu
GetDlgCtrlID
DialogBoxParamA
ShowWindow
SetCursor
LoadCursorA
ChildWindowFromPoint
GetSysColorBrush
EndDialog
GetDlgItem
CreateWindowExA
InvalidateRect
SetDlgItemInt
BeginPaint
GetClientRect
GetWindow
SetDlgItemTextA
DrawFrameControl
GetDlgItemTextA
SendDlgItemMessageA
SetWindowTextA
GetWindowRect
GetSystemMetrics
GetDlgItemInt
DeferWindowPos
EndPaint
DefWindowProcA
TranslateAcceleratorA
MessageBoxA
GetWindowPlacement
RegisterClassA
UpdateWindow
SetMenu
LoadAcceleratorsA
SetWindowPos
SendMessageA
LoadIconA
GetWindowLongA
SetWindowLongA
SetFocus
BeginDeferWindowPos
EndDeferWindowPos
CheckMenuItem
GetMenuItemCount
SetClipboardData
GetMenuStringA
EnableWindow
DestroyWindow
GetCursorPos
LoadImageA
GetSysColor
MapWindowPoints
GetMenu
CloseClipboard
GetParent
OpenClipboard
GetDC
EmptyClipboard
MoveWindow
GetSubMenu
EnableMenuItem
ReleaseDC
LoadMenuA
LoadStringA
CreateDialogParamA
ModifyMenuA
GetDeviceCaps
SetTextColor
CreateFontIndirectA
SetBkMode
DeleteObject
GetTextExtentPoint32A
SetBkColor
SelectObject
GetOpenFileNameA
GetSaveFileNameA
FindTextA
RegEnumKeyA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
GetUserNameA
RegCloseKey
SHGetPathFromIDListA
SHGetMalloc
SHBrowseForFolderA
ShellExecuteA
CoInitialize
CoTaskMemFree
CoUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ