Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
FiveM.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
SteamSetup.exe
Resource
win10-20230220-en
Target
Archive.zip
Size
4.4MB
MD5
187b02bde7c01cc1494ececb4b57b0e2
SHA1
4c66f97df400ed27913b46776a678b75cf4f4f50
SHA256
bd2531e5ab7843695245dfb6fd3429954f99a900f0a716b982c420d01fb4a70b
SHA512
002edd06c273d826d896ee4e1382610c4d329faf0313209345bf25ed454dc5ed6267f672854ac190ddbed9556da3322043b100f36bb70a5ce0fa5f9dd0b47ead
SSDEEP
98304:LEnq/JDmPcWJWqHbRVLGO++KtJ6cB1JDA176L:LEnyJDmLJWqHFVLGOR8DAML
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
ord344
InitCommonControlsEx
ord345
CertGetEnhancedKeyUsage
CertFreeCertificateContext
CertEnumCertificatesInStore
CertCloseStore
CertGetIntendedKeyUsage
CertOpenSystemStoreW
CryptUnprotectData
CertOpenSystemStoreA
CreateDirectoryW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
CreateMutexW
OpenMutexW
CreateThread
GetCurrentThread
GetCurrentThreadId
GetSystemTime
GetTickCount64
SystemTimeToFileTime
GetModuleHandleA
GetPrivateProfileIntW
OpenProcess
K32GetProcessImageFileNameW
WriteFile
VerSetConditionMask
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
VerifyVersionInfoW
LoadLibraryA
FindClose
FindFirstFileW
FindNextFileW
GetFileSizeEx
GetPrivateProfileStringW
WritePrivateProfileStringW
GetFullPathNameW
SetFileTime
GetSystemTimeAsFileTime
GetEnvironmentVariableW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetEvent
WaitForSingleObject
CreateEventW
GetExitCodeProcess
GetSystemDirectoryW
IsProcessInJob
CreateJobObjectW
AssignProcessToJobObject
SetInformationJobObject
SetDllDirectoryW
GetFileAttributesExW
ResetEvent
K32EnumProcessModules
GetExitCodeThread
GetProcessId
VirtualAllocEx
ReadProcessMemory
WriteProcessMemory
QueryFullProcessImageNameW
K32GetModuleFileNameExW
MultiByteToWideChar
ReadFile
GetOverlappedResult
EncodePointer
DecodePointer
ReleaseSRWLockShared
AcquireSRWLockShared
InitOnceExecuteOnce
FreeLibrary
LoadResource
LockResource
SizeofResource
FindResourceW
MulDiv
RtlUnwind
Sleep
GetLastError
CloseHandle
GetFileAttributesW
DeleteFileW
CreateFileW
HeapSize
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
GetTimeZoneInformation
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
OutputDebugStringW
GetConsoleOutputCP
SetConsoleCtrlHandler
SetStdHandle
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
VirtualProtect
GetStartupInfoW
ExitProcess
GetCurrentProcessId
CreateRemoteThread
GetCommandLineW
LoadLibraryW
GetProcAddress
GetModuleHandleW
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
MoveFileW
CopyFileW
GetDriveTypeW
FreeLibraryAndExitThread
ExitThread
LoadLibraryExW
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwindEx
RtlPcToFileHeader
LoadLibraryExA
RaiseException
LocalFree
GetModuleFileNameW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
K32GetModuleInformation
CreateProcessW
IsProcessorFeaturePresent
UnhandledExceptionFilter
InitializeSListHead
GetLocaleInfoEx
HeapCreate
HeapAlloc
HeapReAlloc
HeapFree
FlushInstructionCache
CreateToolhelp32Snapshot
Thread32First
Thread32Next
GetSystemInfo
VirtualAlloc
VirtualFree
VirtualQuery
WriteConsoleW
OutputDebugStringA
QueryPerformanceCounter
WideCharToMultiByte
SetFilePointer
FormatMessageA
FormatMessageW
CreateEventA
WaitForSingleObjectEx
FoldStringW
LCMapStringW
CompareStringW
GetDateFormatW
GetTimeFormatW
GetLocaleInfoW
GetCurrencyFormatW
GetLocaleInfoA
EnumSystemLocalesA
IsValidCodePage
IsDBCSLeadByteEx
DuplicateHandle
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
WaitForMultipleObjects
SetUnhandledExceptionFilter
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ReleaseSemaphore
CreateSemaphoreW
VirtualQueryEx
GetProcessTimes
UnregisterWaitEx
UnregisterWait
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeW
ReleaseMutex
RegisterWaitForSingleObject
GetStdHandle
GetFileType
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionEx
SleepEx
QueryPerformanceFrequency
GetTickCount
CompareFileTime
GetEnvironmentVariableA
MoveFileExW
GetStringTypeW
FindFirstFileExW
GetFileInformationByHandle
SetEndOfFile
SetFileInformationByHandle
SetFilePointerEx
AreFileApisANSI
GetFileInformationByHandleEx
InitializeSRWLock
TryEnterCriticalSection
LCMapStringEx
CompareStringEx
GetCPInfo
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
DispatchMessageW
TranslateMessage
SetWindowTextW
PeekMessageW
MsgWaitForMultipleObjects
MonitorFromPoint
LoadIconW
LoadCursorW
FindWindowExW
GetDesktopWindow
SetWindowLongW
GetWindowLongW
GetSysColorBrush
GetSysColor
SendMessageW
EndPaint
BeginPaint
ReleaseDC
GetDC
AllowSetForegroundWindow
SetTimer
SetWindowPos
MoveWindow
GetProcessWindowStation
GetUserObjectInformationW
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassExW
DefWindowProcW
RegisterWindowMessageW
MessageBoxW
SetBkMode
GetDeviceCaps
CreateFontIndirectW
SetTextColor
RegDeleteValueW
RegisterEventSourceW
DeregisterEventSource
RegOpenKeyW
RegEnumValueW
RegCloseKey
GetTokenInformation
OpenProcessToken
RegDeleteKeyW
RegGetValueW
RegSetKeyValueW
ReportEventW
SHParseDisplayName
ShellExecuteW
SHCreateItemFromParsingName
SHGetKnownFolderPath
SetCurrentProcessExplicitAppUserModelID
ord709
SHSetLocalizedName
CommandLineToArgvW
SHBindToParent
RtlCaptureContext
RtlVirtualUnwind
NtQueryInformationProcess
RtlLookupFunctionEntry
SysAllocString
SysFreeString
SysStringLen
GetErrorInfo
SetErrorInfo
AmdPowerXpressRequestHighPerformance
AsyncTrace
BeforeTerminateHandler
DllGetActivationFactory
EarlyInitializeExceptionHandler
GetErrorData
InitializeExceptionHandler
NvOptimusEnablement
RemoteExceptionFunc
TerminateForException
free
malloc
realloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
CN=Valve Corp.,O=Valve Corp.,L=Bellevue,ST=Washington,C=US
CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=US
CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetCurrentDirectoryW
GetFileAttributesW
GetFullPathNameW
Sleep
GetTickCount
CreateFileW
GetFileSize
MoveFileW
SetFileAttributesW
GetModuleFileNameW
CopyFileW
ExitProcess
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
GetVersion
SetErrorMode
WaitForSingleObject
GetCurrentProcess
CompareFileTime
GlobalUnlock
GlobalLock
CreateThread
GetLastError
CreateDirectoryW
CreateProcessW
RemoveDirectoryW
lstrcmpiA
GetTempFileNameW
WriteFile
lstrcpyA
lstrcpyW
MoveFileExW
lstrcatW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleA
GlobalFree
GlobalAlloc
GetShortPathNameW
SearchPathW
lstrcmpiW
SetFileTime
CloseHandle
ExpandEnvironmentStringsW
lstrcmpW
GetDiskFreeSpaceW
lstrlenW
lstrcpynW
GetExitCodeProcess
FindFirstFileW
FindNextFileW
DeleteFileW
SetFilePointer
ReadFile
FindClose
MulDiv
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetSystemMenu
SetClassLongW
IsWindowEnabled
EnableMenuItem
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
wsprintfW
ScreenToClient
GetWindowRect
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
EndDialog
RegisterClassW
SystemParametersInfoW
CreateWindowExW
GetClassInfoW
DialogBoxParamW
CharNextW
ExitWindowsEx
DestroyWindow
LoadImageW
SetTimer
SetWindowTextW
PostQuitMessage
ShowWindow
GetDlgItem
IsWindow
SetWindowLongW
FindWindowExW
TrackPopupMenu
AppendMenuW
CreatePopupMenu
DrawTextW
EndPaint
CreateDialogParamW
SendMessageTimeoutW
SetForegroundWindow
SelectObject
SetBkMode
CreateFontIndirectW
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
RegDeleteKeyW
SetFileSecurityW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumKeyW
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ