Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
Install League of Legends la1.exe
Resource
win7-20221111-es
Behavioral task
behavioral2
Sample
Install League of Legends la1.exe
Resource
win10v2004-20220812-es
Target
Install League of Legends la1.exe
Size
66.7MB
MD5
0dd7ec74b79bdc528d9ebda5f5d58caa
SHA1
347eb25abb87736a5fb78ef35ccc3f0fb1c964d3
SHA256
d2608eeb19b96c352fb829d56d873da29025fb66b0f219336b6b3b7a4eb8cb42
SHA512
8804254a2d2bdd9b72e08fc38566e3f9b69034b76b86509d35bf7913a864b61664af3a8725c3ddbc8728210719ebf46b7e2c92033a0aae7fb38f9af5680b9355
SSDEEP
1572864:TnRkz7Sp8K0UNl/Ywrt9E7lzPF5KBBhDIVIbjUp1xD:Gqp8KnAtqBBhDIVNj
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
SERIALNUMBER=4155843,CN=Riot Games\, Inc.,O=Riot Games\, Inc.,L=Los Angeles,ST=California,C=US,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553
CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=US
CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US
SERIALNUMBER=4155843,CN=Riot Games\, Inc.,O=Riot Games\, Inc.,L=Los Angeles,ST=California,C=US,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553
CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=US
CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
CreateWellKnownSid
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegGetValueW
SetEntriesInAclW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
SetSecurityInfo
BuildTrusteeWithSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenProcessToken
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
GetFileSecurityW
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
ConvertSidToStringSidA
ConvertSecurityDescriptorToStringSecurityDescriptorA
RegDeleteKeyW
RegDeleteValueA
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
GetEffectiveRightsFromAclW
ConvertStringSidToSidW
RegDeleteKeyExW
BCryptGenRandom
CertFreeCertificateContext
CertEnumCertificatesInStore
CertOpenStore
CertCloseStore
DnsFree
DnsQuery_W
AddFontMemResourceEx
SetBkMode
GetTextExtentExPointW
GetTextExtentPoint32W
GetDIBits
RemoveFontMemResourceEx
CreateDIBitmap
ExtTextOutW
CreateFontW
CreateCompatibleDC
DeleteDC
DeleteObject
SelectObject
SetTextColor
CreateDIBSection
GetObjectW
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipBitmapLockBits
GdipBitmapUnlockBits
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
ReleaseSemaphore
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SignalObjectAndWait
CreateTimerQueue
SetEnvironmentVariableW
FreeEnvironmentStringsW
VirtualProtect
GetLogicalDriveStringsW
QueryDosDeviceW
IsDebuggerPresent
DebugBreak
OutputDebugStringW
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
GetCurrentProcess
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
LocalFree
FormatMessageW
OutputDebugStringA
CloseHandle
WaitForSingleObject
WaitForSingleObjectEx
TerminateProcess
GetExitCodeProcess
CreateThread
CreateProcessW
GetProcessId
OpenProcess
VirtualAlloc
VirtualFree
IsProcessInJob
CreateJobObjectW
AssignProcessToJobObject
TerminateJobObject
SetInformationJobObject
ReadFile
SetEvent
CreateEventW
GetModuleHandleA
GlobalAlloc
GlobalLock
MultiByteToWideChar
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
DeleteFileW
FindClose
FindFirstFileA
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
FlushFileBuffers
GetFileAttributesW
GetFileAttributesExA
GetFileAttributesExW
GetFileSizeEx
GetFinalPathNameByHandleW
GetTempFileNameW
LockFileEx
RemoveDirectoryW
SetEndOfFile
SetFileAttributesW
SetFileInformationByHandle
SetFilePointer
SetFilePointerEx
UnlockFileEx
WriteFile
GetTempPathW
RaiseException
DeviceIoControl
Sleep
GetProcessTimes
GetCurrentProcessId
GetCurrentThread
GetSystemInfo
GetSystemTime
GetVersionExW
FreeLibrary
GetModuleFileNameW
LoadLibraryW
MoveFileExW
SystemTimeToFileTime
GetFileInformationByHandleEx
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
QueryPerformanceCounter
QueryPerformanceFrequency
SetThreadPriority
GetThreadPriority
SetPriorityClass
GetPriorityClass
GetPhysicallyInstalledSystemMemory
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
SetHandleInformation
GetCommandLineW
GetCurrentDirectoryA
DeleteFileA
GetDiskFreeSpaceA
GetFileAttributesA
GetLocalTime
CopyFileW
WideCharToMultiByte
GetFileSize
CreateFileMappingA
LocalAlloc
LoadResource
LockResource
SizeofResource
EnumResourceNamesA
FindResourceA
GetUserDefaultLCID
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
SleepEx
GetTickCount
GetSystemTimeAsFileTime
GetLocaleInfoEx
GetEnvironmentVariableW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FindFirstFileW
GetStdHandle
GetFileType
InitializeCriticalSection
LoadLibraryExW
SetUnhandledExceptionFilter
GetExitCodeThread
FormatMessageA
DuplicateHandle
TryEnterCriticalSection
UnlockFile
HeapDestroy
HeapCompact
HeapReAlloc
HeapSize
HeapValidate
CreateMutexW
LockFile
GetDiskFreeSpaceW
GetFullPathNameW
HeapCreate
AreFileApisANSI
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
SetStdHandle
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
GetTimeFormatW
GetDateFormatW
ExitProcess
WriteConsoleW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetDriveTypeW
FreeLibraryAndExitThread
ExitThread
RtlUnwind
InterlockedFlushSList
InterlockedPushEntrySList
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
DecodePointer
EncodePointer
GetStringTypeW
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetFileInformationByHandle
QueueUserWorkItem
InitOnceComplete
InitOnceBeginInitialize
GetNativeSystemInfo
SwitchToThread
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
ResetEvent
CoUninitialize
CoCreateInstance
CoInitialize
CoInitializeEx
CreateStreamOnHGlobal
GetModuleFileNameExW
GetMappedFileNameW
UuidCreate
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
CommandLineToArgvW
SetCursor
SetWindowTextW
SetActiveWindow
GetKeyState
GetWindowPlacement
ShowWindow
CreateWindowExW
RegisterClassExW
UnregisterClassW
PostQuitMessage
SetWindowPos
SendMessageW
GetMonitorInfoW
MonitorFromWindow
LoadCursorW
SetWindowLongW
GetWindowLongW
ScreenToClient
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
DefWindowProcW
DestroyWindow
UpdateLayeredWindow
SetCapture
ReleaseCapture
ReleaseDC
GetDC
SetForegroundWindow
getpeername
gethostname
htons
htonl
WSAGetLastError
shutdown
send
select
recv
ntohl
listen
WSASetLastError
getsockopt
ioctlsocket
connect
accept
__WSAFDIsSet
freeaddrinfo
getaddrinfo
WSAAddressToStringA
WSAStringToAddressA
WSACleanup
WSAStartup
setsockopt
socket
getsockname
closesocket
bind
WSAIoctl
recvfrom
sendto
inet_addr
ntohs
SysAllocString
GetErrorInfo
SetErrorInfo
SysFreeString
SysStringLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ