Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
whql-amd-software-adrenalin-edition-23.9.2-win10-win11-sep19-vega-polaris.exe
Resource
win10v2004-20230915-es
Target
whql-amd-software-adrenalin-edition-23.9.2-win10-win11-sep19-vega-polaris.exe
Size
624.4MB
MD5
8f19532b3ff9afacf3a604a7df8b04b3
SHA1
30e09f5dc2635e1573a4263ea582ac43e1629cfc
SHA256
65ebcb45d53c5dba68ff3be2122c622c1dbe716448ecb0c2a575f32cc9f60dee
SHA512
4d25953548d5917f02ed39e4a008cf21e0102047bc3a1abe370108d03cb9963b27724025210c90cc898003b04c6e475a3fb73c33ba6b2339a5a01fc576e92511
SSDEEP
12582912:86mWX94xIqsOuLwL07sR0E1KJaL2wtldbh4pylTMb7ztY:86D9qeLwo7FBg2KldVlcHtY
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetLastError
InitializeCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
WaitForSingleObject
CreateEventA
ResumeThread
SetThreadAffinityMask
CreateSemaphoreA
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GlobalUnlock
GlobalLock
FreeLibrary
GetModuleFileNameA
GetModuleFileNameW
LoadLibraryExA
LoadLibraryA
LoadLibraryW
LocalFree
FormatMessageA
FormatMessageW
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
CreateDirectoryA
CreateDirectoryW
CreateFileW
DeleteFileA
DeleteFileW
RemoveDirectoryA
RemoveDirectoryW
SetFileAttributesA
SetFileAttributesW
SetFileTime
GetTempPathW
GetTempPathA
SetLastError
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetSystemDirectoryA
GetWindowsDirectoryA
GetWindowsDirectoryW
GetModuleHandleW
MoveFileA
MoveFileW
FindClose
FindCloseChangeNotification
FindFirstChangeNotificationA
FindFirstChangeNotificationW
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
GetFileAttributesA
GetFileAttributesW
GetFileInformationByHandle
GetLogicalDriveStringsW
GetLogicalDriveStringsA
CreateFileA
GetFileSize
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
GlobalAlloc
GlobalReAlloc
GlobalFree
CompareFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentProcess
CloseHandle
GetSystemInfo
GetProcessAffinityMask
GetStdHandle
GetCommandLineW
Sleep
WaitForMultipleObjects
SetPriorityClass
GetDriveTypeW
GetExitCodeProcess
ProcessIdToSessionId
LocalAlloc
SetDefaultDllDirectories
CreateEventW
WaitForSingleObjectEx
VirtualQuery
VirtualProtect
WriteConsoleW
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
HeapSize
GetFileSizeEx
GetTimeZoneInformation
SetStdHandle
OutputDebugStringW
SetConsoleCtrlHandler
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileType
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetCurrentThread
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleExW
RtlUnwind
FreeLibraryAndExitThread
ExitThread
CreateThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
InterlockedFlushSList
InterlockedPushEntrySList
RaiseException
RtlPcToFileHeader
RtlUnwindEx
MoveFileExW
CopyFileExW
CreateDirectoryExW
DeviceIoControl
SetFilePointerEx
GetFullPathNameW
GetFileTime
GetFileAttributesExW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
lstrcatW
lstrlenW
LoadLibraryExW
GetProcAddress
GetVersionExA
GetModuleHandleA
GetSystemDirectoryW
IsProcessorFeaturePresent
VirtualFree
GlobalMemoryStatusEx
VirtualAlloc
GetDiskFreeSpaceExW
FlushFileBuffers
GetEnvironmentVariableW
GetLocaleInfoEx
LCMapStringEx
GetCPInfo
CompareStringEx
DecodePointer
EncodePointer
InitializeCriticalSectionEx
GetStringTypeW
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CharUpperW
CharUpperA
CloseClipboard
OpenClipboard
SetClipboardData
LoadIconA
LoadCursorA
LoadBitmapA
SetCursor
GetClientRect
ReleaseDC
GetWindowDC
KillTimer
SetTimer
SetWindowPos
IsDlgButtonChecked
CheckDlgButton
InvalidateRect
EnableWindow
GetKeyState
GetFocus
SetFocus
EndDialog
ShowWindow
PostMessageA
CharPrevExA
GetWindowTextLengthW
GetWindowTextLengthA
GetWindowTextW
GetWindowTextA
SetWindowTextW
SetWindowTextA
CreateWindowExW
RegisterClassW
RegisterClassA
LoadStringW
LoadStringA
SetWindowLongPtrW
CreateWindowExA
CallWindowProcW
CallWindowProcA
GetMonitorInfoA
MonitorFromWindow
SystemParametersInfoA
MapDialogRect
GetParent
SetWindowLongPtrA
GetWindowLongPtrA
ScreenToClient
GetWindowRect
GetDialogBaseUnits
GetDlgItem
DialogBoxParamW
DialogBoxParamA
CreateDialogParamW
CreateDialogParamA
MoveWindow
SendMessageW
SendMessageA
IsClipboardFormatAvailable
EmptyClipboard
MessageBoxW
SetBkMode
GetStockObject
CreateFontA
SetTextColor
GetOpenFileNameW
GetOpenFileNameA
CommDlgExtendedError
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CreateWellKnownSid
SetEntriesInAclW
DragQueryFileW
DragFinish
SHGetMalloc
DragQueryFileA
SHGetPathFromIDListA
ShellExecuteExW
SHGetSpecialFolderLocation
CommandLineToArgvW
SHGetFileInfoA
SHBrowseForFolderA
CoCreateInstance
OleInitialize
CoInitialize
CoUninitialize
VariantCopy
VariantClear
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ