Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
DiscordSetup.exe
Resource
win10v2004-20230220-es
Target
DiscordSetup.exe
Size
47.1MB
MD5
3defc98a4402771ce6497d43af9b3900
SHA1
54d7fd694d64b3c3fce6abee97fb6a1f1fefe0dd
SHA256
b3d4653bdbd7a2adbebd47cfe4f45d0b7f2ce9720919202f8b22a9271af3d447
SHA512
a5e757ce68cc30f2d9b09406e1e8ccd7b79e9e97ab97d14c3f8dd15d5e9b964d3af4a733eb1fd581908719dd69ded795593a3da0e7ff8b5e607974a68280fbc7
SSDEEP
786432:yYvRszkEiHbIkOsSeCkIoicLwNh/PfTpxtkmvkn7X7o9AlS1CuqUmzxQl5NOj0yB:yY5sIxrHCYicLMFxtkmvkU9qSYuq1Wls
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
SERIALNUMBER=5128862,CN=Hammer & Chisel Inc.,O=Hammer & Chisel Inc.,POSTALCODE=95008,STREET=Suite 1180+STREET=1901 So. Bascom Ave,L=Campbell,ST=California,C=US,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e
CN=DigiCert EV Code Signing CA (SHA2),OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitializeCriticalSectionAndSpinCount
FreeResource
LoadResource
FindResourceW
SizeofResource
LockResource
CreateDirectoryW
LocalFree
CopyFileW
GetFileAttributesW
CreateFileW
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
WideCharToMultiByte
WriteFile
SetFileTime
CreateProcessW
lstrcmpiW
LeaveCriticalSection
RaiseException
EnterCriticalSection
LoadLibraryExW
GetCurrentThreadId
DecodePointer
FreeLibrary
SetEndOfFile
LCMapStringW
CompareStringW
LoadLibraryW
GetCurrentProcess
GetModuleFileNameW
DeleteFileW
CloseHandle
GetExitCodeProcess
WaitForSingleObject
MoveFileW
GetTempFileNameW
GetLastError
GetTempPathW
lstrlenW
DeleteCriticalSection
GetModuleHandleW
GetProcAddress
VerSetConditionMask
WriteConsoleW
SetStdHandle
GetStringTypeW
ReadConsoleW
SetEnvironmentVariableA
SetFilePointerEx
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetConsoleMode
GetConsoleCP
GetCPInfo
GetOEMCP
GetACP
OutputDebugStringW
VerifyVersionInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
EncodePointer
GetCommandLineW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetStdHandle
GetFileType
ExitProcess
GetModuleHandleExW
AreFileApisANSI
RtlUnwind
GetProcessHeap
HeapSize
HeapReAlloc
IsValidCodePage
CharNextW
DestroyWindow
LoadStringW
ExitWindowsEx
GetActiveWindow
MessageBoxW
wsprintfW
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
GetTokenInformation
GetUserNameW
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
VariantInit
VarUI4FromStr
SysFreeString
SysAllocString
VariantClear
URLDownloadToFileW
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ