Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Adware.GameVance.283.16569.357.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Adware.GameVance.283.16569.357.exe
Resource
win10v2004-20240226-en
Target
SecuriteInfo.com.Adware.GameVance.283.16569.357.exe
Size
12.2MB
MD5
8a7a0c7bb25d5eb4be8c8801c413ebaf
SHA1
d4eaea8c361e0ef62fa54840c2efac67ddf5a938
SHA256
c55d32a0ecf5b8f14b69f26d1ce598210fcbb9c6a1742f5445216284f6f3476c
SHA512
d3fbcd5ba3d45a6c1a9bd5f27dddcfdad083dece6e46e90502c4fa0ad3c3eae741c6d37e9e009c29441057f815e2a4c51e5f8b70ad232e6dd3633964ad471ea2
SSDEEP
393216:hg08MsmxkNgvjqflxNeowMj2As8lvAr0Tb:hg3M8NgIUUj2ulvArYb
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
FormatMessageA
DeleteFileA
MulDiv
IsDBCSLeadByte
GetExitCodeProcess
CreateProcessA
GetTempFileNameA
GetSystemDefaultLCID
WaitForSingleObject
CompareStringA
Sleep
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
FreeLibrary
RemoveDirectoryA
FindNextFileA
WritePrivateProfileSectionA
GetStartupInfoA
WriteFile
ReadFile
SetFileAttributesA
LocalFree
LocalAlloc
LockResource
LoadResource
FindResourceA
SizeofResource
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
MultiByteToWideChar
lstrcmpiA
GetDiskFreeSpaceA
HeapAlloc
GetProcessHeap
HeapFree
lstrcpynA
ExitProcess
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CreateDirectoryA
SetFilePointer
GetFileSize
FindClose
GetLastError
FindFirstFileA
lstrlenA
GetFileAttributesA
GetPrivateProfileStringA
GetSystemDirectoryA
GetWindowsDirectoryA
lstrcatA
GetModuleFileNameA
GetTempPathA
lstrcpyA
GetPrivateProfileSectionA
LoadLibraryA
MoveFileExA
WritePrivateProfileStringA
GetShortPathNameA
FlushFileBuffers
IsBadCodePtr
CloseHandle
SetStdHandle
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetVersion
GetCommandLineA
RtlUnwind
IsBadReadPtr
SetFocus
PostMessageA
GetDlgItem
SendDlgItemMessageA
GetParent
GetDC
LoadImageA
MessageBoxA
wsprintfA
CheckRadioButton
EnableWindow
IsDlgButtonChecked
GetDlgItemTextA
CheckDlgButton
SetDlgItemTextA
ReleaseDC
GetWindowLongA
SetWindowTextA
CharNextA
GetDesktopWindow
GetWindowTextA
GetWindow
DestroyWindow
CreateDialogParamA
GetSysColor
GetSysColorBrush
FillRect
BeginPaint
DrawTextA
EndPaint
GetClientRect
ScreenToClient
MoveWindow
SetParent
MapDialogRect
GetNextDlgTabItem
GetWindowRect
CreateDialogIndirectParamA
IsWindow
InvalidateRect
IsWindowEnabled
ShowWindow
UpdateWindow
IsDialogMessageA
SetWindowPos
GetActiveWindow
SetActiveWindow
SetWindowLongA
LoadStringA
LoadIconA
DispatchMessageA
SendMessageA
TranslateMessage
PeekMessageA
CreateFontIndirectA
RealizePalette
SelectPalette
CreatePalette
GetObjectA
GetStockObject
CreateDIBitmap
GetTextExtentPointA
SelectObject
EnumFontFamiliesExA
DeleteDC
BitBlt
TextOutA
SetBkMode
SetBkColor
CreateCompatibleDC
CreateSolidBrush
SetTextColor
DeleteObject
GetDeviceCaps
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
LZOpenFileA
LZCopy
LZClose
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ