Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Target
Grand-Theft-Auto-V-Windows-1-66-en.exe
Size
96.4MB
MD5
2de246e15211c9fbf130889c42cd57d5
SHA1
07f7000dcd0ba5fd93d3f5ea564aa6a81a92e6c1
SHA256
738b1eb3592c56a7ac6dbd71261fe9971901966b80890a0c641c2112aa2a05e7
SHA512
9a887cb211f219489bb011efce424cc38cd10eb7da21eb4015ea07511c70aa94b556ca6d777747167d27b0664aadb14692ff900726efca70488973035e1f8b4b
SSDEEP
3145728:smMsobug25eSHL9nqdnfs8ZxBDe0/mDe0/i4BxH:s5sobuESHM9HlDe0uDe0d
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
FreeLibrary
VerifyVersionInfoW
LoadLibraryExW
CreateDirectoryW
SizeofResource
FindFirstFileW
FindNextFileW
WriteFile
TerminateProcess
RemoveDirectoryW
GetModuleFileNameW
K32GetModuleFileNameExW
GetTempPathW
InitializeCriticalSectionEx
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
OpenProcess
CreateToolhelp32Snapshot
Sleep
GetLastError
Process32NextW
GetDiskFreeSpaceExW
LockResource
GlobalAlloc
DeleteFileW
Process32FirstW
CloseHandle
RaiseException
VerSetConditionMask
FindResourceW
DecodePointer
GlobalLock
LocalFree
DeleteCriticalSection
GetModuleHandleW
GlobalUnlock
SetDllDirectoryW
MulDiv
GetExitCodeProcess
SetThreadLocale
SetThreadUILanguage
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetFileSizeEx
SetLastError
RegisterWaitForSingleObject
SetFilePointer
GetCurrentThreadId
CreateEventW
GetLocalTime
UnregisterWaitEx
GetCurrentProcessId
FormatMessageA
MoveFileW
MultiByteToWideChar
WideCharToMultiByte
SetSearchPathMode
GetCurrentDirectoryW
LoadResource
GetProcAddress
LoadLibraryW
QueryDepthSList
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetStringTypeW
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThread
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
EncodePointer
CompareStringW
LCMapStringW
GetCPInfo
OutputDebugStringW
RtlUnwindEx
RtlPcToFileHeader
InterlockedPushEntrySList
InterlockedFlushSList
GetFileAttributesExW
SetFileAttributesW
SetFileTime
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
GetFileType
ReadFile
ExitProcess
GetModuleHandleExW
GetStdHandle
CreateThread
ExitThread
FreeLibraryAndExitThread
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapFree
SetFilePointerEx
HeapAlloc
ReadConsoleW
SetStdHandle
GetTimeZoneInformation
HeapReAlloc
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
HeapSize
SetEndOfFile
WriteConsoleW
CreateTimerQueue
SetEvent
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
UnregisterWait
GetThreadTimes
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
PrintDlgW
SysAllocString
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ