Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
wpovlay.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
wpovlay.dll
Resource
win10v2004-20240226-en
Target
63687d7848f3221a07d6ab78dd7c046be5eaba8923c9484e26e0359e2948ce7e
Size
116KB
MD5
7a127c67be1752b070acedd4fc6774e9
SHA1
81c09339d20aad02aa183cba042208673eeb04ee
SHA256
63687d7848f3221a07d6ab78dd7c046be5eaba8923c9484e26e0359e2948ce7e
SHA512
11047ced8f7010f0e2da58deb4e9b98b7bd41b6c9b12dba30735c1f61dfc68f9b82cfc0d4c9842cf885996d73252b0b337d7e7995220fccf3f07b24015b7fafb
SSDEEP
3072:QeKIwLQyaGM5NRTQTgzhxlwCqicfA7Gr6szxf:QtLQ/GM5jTaSxeCxcfmGrFf
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
GetLastError
Sleep
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
GetSystemInfo
GetModuleHandleW
GetVersionExW
CreateThread
InterlockedIncrement
InterlockedDecrement
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
SizeofResource
lstrcmpiW
LoadLibraryExW
GetModuleFileNameA
FindResourceW
GetPrivateProfileIntW
WritePrivateProfileStringW
EncodePointer
DecodePointer
GetThreadLocale
SetThreadLocale
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameW
GetCurrentProcessId
FindNextFileW
FindFirstFileW
CreateFileW
FreeLibrary
CloseHandle
FindClose
ReadFile
WriteFile
LoadLibraryW
GetCurrentProcess
GetProcAddress
GetPrivateProfileStringW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
GetACP
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
InterlockedFlushSList
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
IsDebuggerPresent
OutputDebugStringW
SetLastError
TlsAlloc
CharNextW
LoadStringW
RegCreateKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegCloseKey
LookupAccountSidW
GetTokenInformation
OpenProcessToken
SHGetSpecialFolderPathW
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
SysFreeString
SysStringLen
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
SysAllocString
RegisterTypeLi
UnRegisterTypeLi
StrStrIA
PathFileExistsW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ