Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
32 bit/amtlib.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
32 bit/amtlib.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
64 bit/amtlib.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
64 bit/amtlib.dll
Resource
win10v2004-20230220-en
Target
Photoshop Cracks.zip
Size
1.6MB
MD5
bb053d3163a294457e02a81c2be507f4
SHA1
a0fbf32463514651990c624054359e5cdd2d10a8
SHA256
9c613b125ce087a240f78a94fddb0372436e28d266886b9691438dbb659cfdaa
SHA512
dc6c8c1b25a5eeadc1dfbe07be29952ea5e79d65f2751207726ba19dd688248903b0549aa993eae2a1319cb4fae94bfde07af14c514f651a005077104d8bf27a
SSDEEP
24576:UGgEYW7XA0u+7DpqK8rVWr4M7I3dzmGf+RA+7J2qEdQd3O2J1ioaE9/Atsx7kslF:uwnu+3Jr4M7INAp2O3rcoaYYtsae/
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WinHttpGetProxyForUrl
WinHttpOpen
WinHttpGetIEProxyConfigForCurrentUser
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpSetStatusCallback
WinHttpCrackUrl
WinHttpConnect
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSetCredentials
WinHttpSendRequest
WinHttpReadData
WinHttpQueryHeaders
WinHttpCloseHandle
CM_Get_DevNode_Status
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
GetIfTable
GetCurrentProcess
GetLastError
GetCurrentThread
SetLastError
FormatMessageW
FreeLibrary
LoadLibraryW
LocalFree
GetProcAddress
QueryPerformanceCounter
QueryPerformanceFrequency
GetEnvironmentVariableA
GetModuleFileNameW
CreateSemaphoreW
ReleaseSemaphore
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateThread
SetEvent
OpenEventW
GetTickCount
GetLocalTime
GetTimeZoneInformation
GetVersionExW
GetComputerNameExW
WideCharToMultiByte
MultiByteToWideChar
FreeEnvironmentStringsW
GetTempPathW
TryEnterCriticalSection
CloseHandle
ResumeThread
CreateProcessW
FindClose
FindNextFileW
FindFirstFileW
GlobalFree
WaitForMultipleObjects
CreateEventW
CreateDirectoryW
GetFileAttributesW
CreateFileW
SetFileAttributesW
IsDBCSLeadByteEx
GetFileSize
SetFilePointer
SetEndOfFile
UnlockFileEx
WriteFile
ReadFile
FlushFileBuffers
LockFileEx
LocalAlloc
InterlockedIncrement
InterlockedDecrement
lstrlenA
lstrlenW
GetModuleFileNameA
GetStartupInfoW
GetEnvironmentStringsW
GetConsoleCP
GetConsoleMode
FatalAppExitA
GetFileInformationByHandle
SwitchToThread
PeekNamedPipe
GetCurrentDirectoryW
SetCurrentDirectoryW
SetStdHandle
CreateFileA
GetFileAttributesA
GetFullPathNameA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
DeleteFileA
IsValidLocale
SetConsoleCtrlHandler
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
OutputDebugStringA
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetLocaleInfoW
HeapSize
GetStdHandle
ExitProcess
IsValidCodePage
GetOEMCP
GetACP
HeapDestroy
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
GetStringTypeW
InterlockedCompareExchange
InterlockedExchange
Sleep
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
HeapFree
HeapReAlloc
HeapAlloc
GetFullPathNameW
GetCurrentThreadId
GetCommandLineA
GetCurrentProcessId
GetTimeFormatA
GetDateFormatA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
DeleteFileW
GetDriveTypeA
FindFirstFileExA
MoveFileA
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
TlsAlloc
MessageBoxW
RegDeleteKeyA
GetNamedSecurityInfoW
SetNamedSecurityInfoW
SetEntriesInAclW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
RegOpenKeyA
RegCreateKeyA
SetSecurityInfo
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegDeleteKeyW
SetTokenInformation
OpenThreadToken
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
ShellExecuteA
SHGetFolderPathW
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
CoInitializeEx
CreateErrorInfo
SetErrorInfo
VariantInit
VariantChangeType
GetErrorInfo
SysAllocStringByteLen
VariantClear
SysStringLen
SysAllocString
SysFreeString
AMTGetLibVersion
AMTGetParentLEIDLicenseStatus
AMTGetProductClearSerialNumber
AMTObtainProductLicense
AMTPlugPlugRequest
AMTPreObtainProductLicense
AMTPreValidateProductLicense
AMTReleaseProductLicense
AMTRetrieveAdobeID
AMTValidateProductLicense
GetAsnVersion
asnInst_InstallerProductInfo_constructor
asnInst_getAsnProductInfo
asnInst_getAsnProductInfoInMem
asn_exit
asn_info
asn_init
asn_makePrivate
asn_makePrivateEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WinHttpGetProxyForUrl
WinHttpOpen
WinHttpGetIEProxyConfigForCurrentUser
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpSetStatusCallback
WinHttpCrackUrl
WinHttpConnect
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSetCredentials
WinHttpSendRequest
WinHttpReadData
WinHttpQueryHeaders
WinHttpCloseHandle
CM_Get_DevNode_Status
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
GetIfTable
GetCurrentProcess
GetLastError
GetCurrentThread
SetLastError
FormatMessageW
FreeLibrary
LoadLibraryW
LocalFree
GetProcAddress
QueryPerformanceCounter
QueryPerformanceFrequency
GetEnvironmentVariableA
GetModuleFileNameW
CreateSemaphoreW
ReleaseSemaphore
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateThread
SetEvent
OpenEventW
GetTickCount
GetLocalTime
GetTimeZoneInformation
GetVersionExW
GetComputerNameExW
WideCharToMultiByte
FreeEnvironmentStringsW
OutputDebugStringA
GetTempPathW
CloseHandle
SwitchToThread
ResumeThread
CreateProcessW
FindClose
FindNextFileW
FindFirstFileW
GlobalFree
WaitForMultipleObjects
CreateEventW
CreateDirectoryW
GetFileAttributesW
CreateFileW
SetFileAttributesW
IsDBCSLeadByteEx
GetFileSize
SetFilePointer
SetEndOfFile
UnlockFileEx
WriteFile
ReadFile
FlushFileBuffers
LockFileEx
LocalAlloc
lstrlenA
lstrlenW
GetModuleFileNameA
GetStartupInfoW
GetEnvironmentStringsW
GetConsoleCP
GetConsoleMode
FatalAppExitA
GetFileInformationByHandle
TryEnterCriticalSection
PeekNamedPipe
GetCurrentDirectoryW
SetCurrentDirectoryW
SetStdHandle
CreateFileA
GetFileAttributesA
GetFullPathNameA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetConsoleCtrlHandler
WriteConsoleW
DeleteFileA
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
MultiByteToWideChar
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetLocaleInfoW
HeapSize
GetStdHandle
ExitProcess
GetModuleHandleW
IsValidCodePage
GetOEMCP
GetACP
HeapDestroy
HeapCreate
GetVersion
HeapSetInformation
RtlCaptureContext
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
Sleep
EncodePointer
DecodePointer
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
GetSystemTimeAsFileTime
HeapFree
HeapReAlloc
HeapAlloc
GetFullPathNameW
GetCurrentThreadId
FlsSetValue
GetCommandLineA
GetCurrentProcessId
GetDateFormatA
GetTimeFormatA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
DeleteFileW
GetDriveTypeA
FindFirstFileExA
MoveFileA
LCMapStringW
GetCPInfo
FlsGetValue
FlsFree
FlsAlloc
TerminateProcess
MessageBoxW
SetSecurityDescriptorDacl
GetNamedSecurityInfoW
SetNamedSecurityInfoW
SetEntriesInAclW
InitializeSecurityDescriptor
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyA
RegCreateKeyA
SetSecurityInfo
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegDeleteKeyW
SetTokenInformation
OpenThreadToken
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
ShellExecuteA
SHGetFolderPathW
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
CoInitializeEx
CreateErrorInfo
SetErrorInfo
VariantInit
VariantChangeType
GetErrorInfo
SysAllocStringByteLen
VariantClear
SysStringLen
SysAllocString
SysFreeString
AMTGetLibVersion
AMTGetParentLEIDLicenseStatus
AMTGetProductClearSerialNumber
AMTObtainProductLicense
AMTPlugPlugRequest
AMTPreObtainProductLicense
AMTPreValidateProductLicense
AMTReleaseProductLicense
AMTRetrieveAdobeID
AMTValidateProductLicense
GetAsnVersion
asnInst_InstallerProductInfo_constructor
asnInst_getAsnProductInfo
asnInst_getAsnProductInfoInMem
asn_exit
asn_info
asn_init
asn_makePrivate
asn_makePrivateEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ