Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
7797749a1f359ca2075b29737bdd1b783cef967c1e2b25bf5a033ff2a545a843.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7797749a1f359ca2075b29737bdd1b783cef967c1e2b25bf5a033ff2a545a843.exe
Resource
win10v2004-20240611-en
Target
7797749a1f359ca2075b29737bdd1b783cef967c1e2b25bf5a033ff2a545a843
Size
999KB
MD5
eb1ed4db34e6d26c31028a1d39b2874e
SHA1
0f175203e580faec9958e5263287d820d8d4fc8e
SHA256
7797749a1f359ca2075b29737bdd1b783cef967c1e2b25bf5a033ff2a545a843
SHA512
f292703774a2744531a09ae63095ac5e539a18237de9aaabf670a8c4701495ebe0949d609bf20e11f6bf3ee0b1a4bb014cf99e8b5753556129f805971ff07f15
SSDEEP
24576:fLoYic/78XM7sAl+wDV3QCBqiLNhdKisQ:fsXc/wXYbBqiLNhwZQ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
F:\Works\wuliang\XKGameBox2.0\Release\XKFlashGameBrowser.pdb
GetExitCodeThread
OutputDebugStringW
MulDiv
FreeResource
ReadFile
GetACP
ExitProcess
DosDateTimeToFileTime
SetFilePointer
SystemTimeToFileTime
GetFileType
DuplicateHandle
SetEnvironmentVariableA
SetEndOfFile
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetStringTypeW
GetLocaleInfoW
SetLastError
TlsFree
TlsSetValue
GetCurrentDirectoryW
TlsAlloc
IsValidCodePage
GetOEMCP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapCreate
IsProcessorFeaturePresent
SetHandleCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CompareStringW
GetCPInfo
LCMapStringW
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
GetStdHandle
WriteConsoleW
DecodePointer
EncodePointer
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
lstrlenA
GetCurrentProcessId
GetCurrentThreadId
GetThreadPriority
GetSystemInfo
VirtualProtectEx
VirtualAlloc
FlushInstructionCache
SetThreadPriority
InitializeCriticalSection
VirtualFree
GetCurrentProcess
VirtualQuery
GetThreadContext
CreateDirectoryW
CreateProcessW
DeleteCriticalSection
lstrcmpiW
EnterCriticalSection
RaiseException
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
InterlockedIncrement
LoadLibraryExW
FreeLibrary
GetLastError
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameW
GetTickCount
CreateThread
ResumeThread
SuspendThread
LockResource
OpenThread
SizeofResource
InterlockedDecrement
LoadResource
FindResourceW
FindResourceExW
Sleep
GetCurrentThread
LocalFree
WriteFile
CloseHandle
GetProcAddress
GetFileSize
CreateFileW
GetVersionExW
LoadLibraryW
TlsGetValue
GetClassInfoExW
SetPropW
TranslateMessage
IsWindow
RegisterClassW
GetPropW
CallWindowProcW
DispatchMessageW
HideCaret
ShowCaret
GetSysColor
CreateCaret
LoadImageW
IsRectEmpty
GetFocus
GetWindowTextLengthW
GetKeyState
GetMessageW
DestroyIcon
DrawIconEx
GetUpdateRect
SetRect
CharPrevW
GetWindow
DefWindowProcW
GetClassNameW
RegisterClassExW
SetFocus
LoadCursorW
PostQuitMessage
ReleaseDC
MoveWindow
GetDC
DrawTextW
LoadIconW
OffsetRect
InflateRect
wvsprintfW
SetCaretPos
KillTimer
SetTimer
SendMessageW
ShowWindow
GetClientRect
SetWindowLongW
GetWindowLongW
GetWindowTextW
EnableWindow
SetWindowTextW
PtInRect
EndPaint
IsIconic
GetWindowRect
ScreenToClient
SetWindowRgn
MessageBoxW
SetWindowPos
CharNextW
GetMonitorInfoW
IsWindowVisible
GetSystemMetrics
CreateWindowExW
SetLayeredWindowAttributes
MonitorFromWindow
GetParent
AnimateWindow
IsZoomed
PostMessageW
DestroyWindow
ClientToScreen
MapWindowPoints
GetDesktopWindow
IntersectRect
SetForegroundWindow
GetCursorPos
InvalidateRect
FillRect
SetCursor
ReleaseCapture
BeginPaint
CreateAcceleratorTableW
InvalidateRgn
SetCapture
DeleteObject
CreateRoundRectRgn
GetObjectW
CombineRgn
PtInRegion
RestoreDC
CreatePen
SaveDC
Rectangle
GetTextMetricsW
SetWindowOrgEx
TextOutW
CreateSolidBrush
RoundRect
GetClipBox
SetStretchBltMode
GetCharABCWidthsW
ExtTextOutW
CreateRectRgnIndirect
CreatePenIndirect
SelectClipRgn
SetBkColor
StretchBlt
CreateDIBSection
LineTo
MoveToEx
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
DeleteDC
BitBlt
GetDeviceCaps
GetTextExtentPoint32W
GetStockObject
SetBkMode
GetObjectA
CreateFontIndirectW
GetPixel
ExtSelectClipRgn
SetTextColor
CreateRectRgn
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegEnumKeyExW
RegOpenKeyExW
Shell_NotifyIconW
SHGetFolderPathW
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CoTaskMemAlloc
CoInitialize
OleUninitialize
OleInitialize
CoTaskMemRealloc
CoInitializeEx
CoTaskMemFree
PropVariantClear
CoUninitialize
CoCreateInstance
VariantInit
VariantClear
VarUI4FromStr
SysFreeString
SysAllocString
PathFileExistsW
timeGetDevCaps
timeBeginPeriod
timeKillEvent
timeEndPeriod
timeGetTime
timeSetEvent
ord17
_TrackMouseEvent
GdipDeleteFont
GdipSetTextRenderingHint
GdipSetStringFormatLineAlign
GdipCreateFontFromLogfontA
GdipCloneBrush
GdipDeleteBrush
GdiplusStartup
GdipSetStringFormatAlign
GdipDrawImageI
GdiplusShutdown
GdipImageGetFrameCount
GdipCloneImage
GdipImageGetFrameDimensionsCount
GdipCreateFromHDC
GdipGetPropertyItemSize
GdipDisposeImage
GdipAlloc
GdipGetPropertyItem
GdipImageSelectActiveFrame
GdipImageGetFrameDimensionsList
GdipLoadImageFromFile
GdipDeleteGraphics
GdipFree
GdipCreateFontFromDC
GdipDeleteStringFormat
GdipCreateStringFormat
GdipCreateLineBrushI
GdipDrawString
InternetReadFile
InternetCloseHandle
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
InternetOpenW
InternetCrackUrlW
InternetConnectW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ