Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_f66a98f65f5115a973a90a3ab80011fa_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_f66a98f65f5115a973a90a3ab80011fa_magniber.exe
Resource
win10v2004-20240226-en
Target
2024-03-05_f66a98f65f5115a973a90a3ab80011fa_magniber
Size
1.5MB
MD5
f66a98f65f5115a973a90a3ab80011fa
SHA1
18bd548bfd3ea780836f07a9a7b778e947c112f5
SHA256
1cfd1da5bc9f4f135d930ea5d30911f0dce7e1785b93a8aa37cb6a8b900efcd5
SHA512
23551e90158eaa559b40360846b67ab5fe880601866e1ccced7c446e291c0d608fa0d668c7b1f95f8062437335133bc49f806275d087fafeead4f245c0ca201e
SSDEEP
24576:7EJeOLkK+iA3HzHpODad3klsneX2D1PtPljCUtYEgQiNTCAxxlXD5xMe5q4arsa+:5JiAXzADailIeWPljTtHgM6xlp5qhsJx
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\app\cc\LVInstaller\VideofusionInstaller\build\CC_RELEASE\JianyingLauncher.pdb
PowerDeterminePlatformRole
CM_Get_Device_IDW
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
DeleteCriticalSection
GetFileInformationByHandle
GetLocalTime
GetTickCount
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FileTimeToSystemTime
ProcessIdToSessionId
GetCommandLineW
GetDiskFreeSpaceExW
GetVolumeInformationW
QueryDosDeviceW
GetTempPathW
GetCurrentProcessId
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetVersion
GetSystemDirectoryW
LocalAlloc
lstrcmpW
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
CopyFileW
MoveFileExW
WTSGetActiveConsoleSessionId
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
CreateEventW
CreateThread
MoveFileW
InitializeCriticalSectionAndSpinCount
Sleep
OpenMutexA
GetEnvironmentVariableW
lstrlenW
GetProcessId
GetModuleHandleA
GetNativeSystemInfo
GetCurrentThreadId
CreateMutexW
FormatMessageA
OutputDebugStringA
ReleaseMutex
RegisterWaitForSingleObject
UnregisterWaitEx
SetThreadPriority
GetThreadPriority
IsDebuggerPresent
DuplicateHandle
GetUserDefaultLangID
TryEnterCriticalSection
SystemTimeToTzSpecificLocalTime
QueryPerformanceCounter
InitializeCriticalSectionEx
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
GetModuleHandleExW
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetInformationJobObject
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
WaitForMultipleObjects
GlobalMemoryStatusEx
RtlCaptureStackBackTrace
QueueUserWorkItem
GetModuleHandleExA
GetProcessHeaps
HeapSetInformation
HeapUnlock
HeapLock
HeapWalk
GetProcessIoCounters
VirtualQueryEx
GetProcessTimes
GetSystemInfo
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
LoadLibraryExW
WriteConsoleW
SetStdHandle
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
FatalAppExitA
FlushFileBuffers
SetFilePointerEx
ReadConsoleW
GetFileType
CreateSemaphoreW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStdHandle
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
EncodePointer
IsValidCodePage
AreFileApisANSI
ExitProcess
GetConsoleMode
GetConsoleCP
SetConsoleCtrlHandler
DecodePointer
SetFileTime
SystemTimeToFileTime
SetFilePointer
LocalFileTimeToFileTime
GetCurrentDirectoryW
GetCurrentThread
GetCurrentProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LoadLibraryW
FreeLibrary
GetWindowsDirectoryW
OpenProcess
WaitForSingleObject
LocalFree
GetProcAddress
GetModuleHandleW
GetVersionExW
DeviceIoControl
SetLastError
SetFileAttributesW
GetLongPathNameW
GetFullPathNameW
ExpandEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
WriteFile
ReadFile
GetFileSize
CreateFileW
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
RemoveDirectoryW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
CreateDirectoryW
GetUserDefaultLCID
EnumSystemLocalesW
SetEndOfFile
SetEnvironmentVariableA
OutputDebugStringW
GetSystemTimeAsFileTime
LoadLibraryExA
GetFileAttributesExW
IsProcessorFeaturePresent
VirtualQuery
VirtualProtect
VirtualAlloc
RtlUnwind
GetWindowLongW
EnumWindows
GetClassNameW
GetWindowThreadProcessId
GetWindowTextLengthW
GetQueueStatus
GetWindowTextW
PostMessageW
ExitWindowsEx
UnregisterClassW
GetDC
GetDesktopWindow
DestroyWindow
SetTimer
PostQuitMessage
KillTimer
WaitMessage
TranslateMessage
RegisterClassExW
CallMsgFilterW
PeekMessageW
MsgWaitForMultipleObjectsEx
CreateWindowExW
DefWindowProcW
DispatchMessageW
CharUpperW
GetKeyState
IsWindowEnabled
FindWindowW
SystemParametersInfoW
IsWindow
GetSystemMetrics
DeleteObject
GetDeviceCaps
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
RegNotifyChangeKeyValue
RegEnumValueW
RegDeleteValueW
ConvertSidToStringSidW
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegOpenCurrentUser
RegCloseKey
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
FreeSid
EqualSid
DuplicateToken
AllocateAndInitializeSid
AddAccessAllowedAce
AccessCheck
LookupPrivilegeValueW
RevertToSelf
ImpersonateSelf
AdjustTokenPrivileges
OpenThreadToken
SetThreadToken
ConvertStringSidToSidW
LookupAccountSidW
SetTokenInformation
GetTokenInformation
DuplicateTokenEx
OpenProcessToken
CreateProcessAsUserW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
IsValidSid
InitializeSid
InitializeAcl
GetSidSubAuthority
GetSidLengthRequired
GetLengthSid
GetAclInformation
GetAce
CopySid
AddAce
RegisterTraceGuidsW
SHGetKnownFolderPath
ShellExecuteW
ShellExecuteExW
SHGetSpecialFolderPathW
SHGetFolderPathW
SHGetFolderPathA
CommandLineToArgvW
CoInitializeEx
CoUninitialize
CoCreateInstance
CoInitialize
PropVariantClear
CoTaskMemFree
SysAllocString
SysStringLen
VariantClear
SysFreeString
SHStrDupW
StrToIntW
ord176
SHSetValueW
StrChrW
SHGetValueW
StrCmpNW
StrCmpNIW
PathRemoveFileSpecW
PathIsDirectoryW
PathGetDriveNumberW
PathFindExtensionW
PathAddBackslashW
PathFileExistsW
PathAppendW
StrRChrW
StrCmpIW
StrCpyNW
LoadUserProfileW
DestroyEnvironmentBlock
CreateEnvironmentBlock
UnloadUserProfile
WNetGetResourceInformationW
GetProcessMemoryInfo
GetProcessImageFileNameW
GetModuleFileNameExW
EnumProcesses
EnumProcessModules
QueryWorkingSet
NetGetJoinInformation
NetApiBufferFree
timeBeginPeriod
timeGetTime
timeEndPeriod
GetHandleVerifier
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ