Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
cd93469dddd59ddd54ea319a52bdacdeeb304c437e29dc68754ee62a1f8729c7.exe
Resource
win7-20240708-en
Target
cd93469dddd59ddd54ea319a52bdacdeeb304c437e29dc68754ee62a1f8729c7
Size
1.2MB
MD5
1e9e59946dfa5c4725ae99244dac7b5d
SHA1
113d388bc0413c49e31a84c47c46e9457079b0ac
SHA256
cd93469dddd59ddd54ea319a52bdacdeeb304c437e29dc68754ee62a1f8729c7
SHA512
85b4b544d9ba3f2eed86d64b69fa5041d2d9d9000102830ff6854f2aa02cc53e51e4a74978780d65749f04c3bc86db3c0acc8db622f13dde2548440da51bc725
SSDEEP
24576:e+U92swAw2Qh4JY2NAF6jeThHkZWjTztFpTW+O3CGoJ26JrEH7n:e+gQMYkqGNP
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
F:\PCUnlocker-LiveCD\Release_Enterprise\PCUNLOCKER.pdb
SHGetFolderPathA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHBrowseForFolderA
SetEndOfFile
GetCurrentProcess
GetModuleHandleW
SetErrorMode
HeapFree
HeapAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
HeapReAlloc
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
ExitProcess
GetCommandLineA
RtlUnwind
RaiseException
VirtualAlloc
HeapSize
HeapCreate
VirtualFree
GetStdHandle
GetACP
IsValidCodePage
LCMapStringW
SetHandleCount
LCMapStringA
SetStdHandle
GetProcessHeap
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetStringTypeA
GetStringTypeW
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
SetFilePointer
ReadFile
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedDecrement
GetModuleFileNameW
MulDiv
WritePrivateProfileStringA
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GlobalAlloc
lstrlenA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
GlobalFree
lstrcpyA
LoadLibraryExA
FreeLibrary
LocalFree
WinExec
GetModuleHandleA
LoadLibraryA
GetProcAddress
SetLastError
CreateDirectoryA
FormatMessageA
FindNextVolumeA
FindFirstVolumeA
GetVolumePathNamesForVolumeNameA
DeviceIoControl
SetVolumeMountPointA
GetDriveTypeA
DeleteVolumeMountPointA
FindVolumeClose
DeleteFileA
FileTimeToLocalFileTime
CloseHandle
LockResource
CopyFileA
GetLastError
GetLogicalDriveStringsA
FileTimeToSystemTime
CreateProcessA
SizeofResource
Sleep
WideCharToMultiByte
WriteFile
WaitForSingleObject
LoadResource
FreeResource
FindResourceA
CreateFileA
MultiByteToWideChar
GetStartupInfoA
StrStrIA
PathFindExtensionA
PathFindFileNameA
PathRemoveFileSpecW
PathFileExistsA
UnregisterClassA
DestroyMenu
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetWindowThreadProcessId
SetCursor
PostQuitMessage
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetDlgItemTextA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetWindowTextLengthA
GetWindowTextA
GetWindow
GetWindowLongA
SetFocus
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuA
GetMenuState
CheckMenuItem
GetParent
DrawStateA
InvalidateRect
SetWindowRgn
GetWindowRect
GetWindowDC
IsIconic
IsZoomed
GetSubMenu
LoadBitmapA
LoadMenuA
LoadIconA
DrawIcon
GetClientRect
ExitWindowsEx
PtInRect
GetDC
ReleaseDC
EnableMenuItem
PostMessageA
GetSystemMetrics
SendMessageA
EnableWindow
LoadCursorA
GetSysColorBrush
GetSysColor
DeleteDC
GetDeviceCaps
ScaleWindowExtEx
Escape
ExtTextOutA
TextOutA
SetWindowExtEx
RectVisible
PtVisible
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetStockObject
GetTextExtentPoint32A
StretchBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateRectRgn
GetObjectA
CreateSolidBrush
DeleteObject
SetMapMode
SetStretchBltMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
CreateFontIndirectA
SelectObject
TransparentBlt
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
InitCommonControlsEx
_TrackMouseEvent
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitializeEx
VariantClear
VariantChangeType
VariantInit
mciSendStringA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ