Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
Maxon_App_2024.1.1_Win.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
RedGiant Activation Service Unlocker 2024.1.1.exe
Resource
win10v2004-20240226-en
Target
RedGiant.Universe.v2024.1.0.zip
Size
48.8MB
MD5
b5f9535ce7af7a7881afdb17c3faa0f6
SHA1
fc715066b571fd605bce997892ba175494d54150
SHA256
dba2fc000b3cc2371e86f3e6a9ca07851c09a96c1882c428685d2598390ae081
SHA512
966ec9922019ff627e07b7fe1e46f344ef3be3dbd15435e9f81c33af2a7752b961cdc381f80b5792c30e7823d86584003e07bb57b67f4adb58b6a724382511e1
SSDEEP
786432:Mnj3jFP85CCP/tTWaoKptj3ZkJqtLjmX01qKzqZdqHTgxXU2fHUb4VECJ5:GbaLPVTWaoKptj3ZkctLE8sigxTvEC5
Checks for missing Authenticode signature.
resource |
---|
unpack001/RedGiant Activation Service Unlocker 2024.1.1.exe |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSecurityDescriptorOwner
GetSidIdentifierAuthority
GetUserNameA
GetUserNameW
InitializeSecurityDescriptor
RegCloseKey
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExA
InitCommonControlsEx
ChooseColorA
CommDlgExtendedError
GetOpenFileNameA
GetOpenFileNameW
GetSaveFileNameA
GetSaveFileNameW
Arc
BitBlt
Chord
CombineRgn
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
CreateDIBSection
CreateDIBitmap
CreateFontIndirectA
CreateFontIndirectW
CreatePalette
CreatePatternBrush
CreatePen
CreateRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DPtoLP
DeleteDC
DeleteObject
EnumFontFamiliesA
EnumFontFamiliesW
ExtCreatePen
ExtTextOutA
GetBkMode
GetCharWidthA
GetCharWidthW
GetDIBits
GetDeviceCaps
GetFontData
GetMapMode
GetNearestColor
GetNearestPaletteIndex
GetObjectA
GetPaletteEntries
GetPixel
GetRgnBox
GetStockObject
GetTextCharset
GetTextExtentPoint32A
GetTextExtentPoint32W
GetTextExtentPointA
GetTextFaceA
GetTextFaceW
GetTextMetricsA
OffsetClipRgn
PatBlt
Pie
Polygon
Polyline
RealizePalette
RectInRegion
Rectangle
ResizePalette
SelectClipRgn
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetBrushOrgEx
SetMapMode
SetPaletteEntries
SetPolyFillMode
SetROP2
SetRectRgn
SetTextAlign
SetTextColor
StretchDIBits
TextOutA
TextOutW
TranslateCharsetInfo
UpdateColors
ImmGetCompositionStringA
ImmGetCompositionStringW
ImmGetContext
ImmReleaseContext
ImmSetCompositionWindow
BuildCommDCBA
BuildCommDCBW
ClearCommError
CloseHandle
CopyFileA
CopyFileW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileMappingA
CreateFileW
CreatePipe
CreateProcessA
CreateProcessW
CreateSemaphoreW
CreateThread
DeleteCriticalSection
DeleteFileA
DeleteFileW
DeviceIoControl
DuplicateHandle
EnterCriticalSection
EscapeCommFunction
ExitProcess
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindResourceA
FlushFileBuffers
FormatMessageA
FreeLibrary
GetACP
GetCommModemStatus
GetCommState
GetComputerNameA
GetComputerNameW
GetConsoleCP
GetConsoleMode
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentVariableW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFileInformationByHandle
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocaleInfoA
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetOverlappedResult
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetShortPathNameW
GetStartupInfoA
GetStdHandle
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempFileNameW
GetTempPathA
GetTempPathW
GetTickCount
GetTimeZoneInformation
GetVersion
GetVersionExA
GetVolumeInformationA
GetVolumeInformationW
GetWindowsDirectoryA
GetWindowsDirectoryW
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
IsDBCSLeadByte
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadResource
LocalFree
LockResource
MapViewOfFile
MoveFileA
MoveFileW
MulDiv
MultiByteToWideChar
OutputDebugStringA
PeekConsoleInputA
PeekNamedPipe
PurgeComm
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadConsoleA
ReadConsoleW
ReadFile
ReleaseSemaphore
RemoveDirectoryA
RemoveDirectoryW
ResetEvent
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
SearchPathA
SearchPathW
SetCommState
SetCommTimeouts
SetConsoleMode
SetCurrentDirectoryA
SetCurrentDirectoryW
SetEndOfFile
SetEnvironmentVariableW
SetErrorMode
SetEvent
SetFileAttributesA
SetFileAttributesW
SetFilePointer
SetFileTime
SetHandleInformation
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
SetupComm
Sleep
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
lstrcpyA
lstrcpyW
lstrcpynA
lstrlenA
lstrlenW
__C_specific_handler
__argc
__argv
__dllonexit
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_beginthreadex
_cexit
_ctime64
_endthreadex
_environ
_errno
_fdopen
_fileno
_fmode
_ftime64
_get_osfhandle
_gmtime64
_initterm
_localtime64
_lock
_mktime64
_onexit
_open
_stricmp
_strnicmp
_strtoi64
_time64
_unlock
_vsnwprintf
_wcsicmp
_wopen
abort
acos
asin
atan
atan2
atoi
calloc
cosh
exit
fclose
ferror
fflush
fprintf
fputc
fputs
fread
free
frexp
fseek
ftell
fwrite
getenv
isalnum
isalpha
islower
isprint
isspace
isupper
isxdigit
localeconv
log10
malloc
memcmp
memcpy
memmove
memset
printf
puts
qsort
rand_s
realloc
setlocale
signal
sinh
sprintf
sscanf
strcat
strchr
strcmp
strcpy
strcspn
strerror
strlen
strncmp
strncpy
strpbrk
strrchr
strspn
strstr
strtol
strtoul
tan
tanh
tolower
toupper
vfprintf
vsprintf
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcsncpy
_timezone
_hypot
_write
_tzset
_strnicmp
_stricmp
_strdup
_putenv
_isatty
_getpid
CreateBindCtx
CreateErrorInfo
CreateFileMoniker
GetRunningObjectTable
SetErrorInfo
SysAllocString
SysFreeString
VariantChangeType
VariantClear
VariantInit
SHBrowseForFolderA
SHBrowseForFolderW
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
SHGetPathFromIDListW
AdjustWindowRectEx
BeginPaint
CallNextHookEx
CallWindowProcA
CallWindowProcW
CharLowerA
CharLowerW
ClientToScreen
CloseClipboard
CreateCaret
CreateIconFromResource
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExA
CreateWindowExW
DefWindowProcA
DefWindowProcW
DestroyCaret
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageA
DrawEdge
DrawFocusRect
DrawFrameControl
DrawMenuBar
EmptyClipboard
EnableWindow
EndPaint
EnumWindows
FillRect
GetAsyncKeyState
GetCapture
GetClassLongPtrA
GetClientRect
GetClipboardData
GetClipboardOwner
GetCursorPos
GetDC
GetDesktopWindow
GetFocus
GetForegroundWindow
GetKeyState
GetKeyboardLayout
GetMenuCheckMarkDimensions
GetMenuItemCount
GetMessageA
GetMessagePos
GetParent
GetSysColor
GetSysColorBrush
GetSystemMenu
GetSystemMetrics
GetWindow
GetWindowLongPtrA
GetWindowPlacement
GetWindowRect
GetWindowTextA
GetWindowTextW
InsertMenuA
InsertMenuW
InvalidateRect
IsClipboardFormatAvailable
IsIconic
IsWindow
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapA
LoadCursorA
LoadCursorFromFileA
LoadIconA
MapVirtualKeyA
MessageBeep
MessageBoxA
MessageBoxW
MoveWindow
MsgWaitForMultipleObjectsEx
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
RegisterClassExA
RegisterClassW
ReleaseCapture
ReleaseDC
RemoveMenu
ScreenToClient
ScrollWindowEx
SendInput
SendMessageA
SendMessageW
SetActiveWindow
SetCapture
SetCaretPos
SetClassLongPtrA
SetClipboardData
SetCursor
SetCursorPos
SetFocus
SetForegroundWindow
SetMenu
SetParent
SetScrollInfo
SetTimer
SetWindowLongPtrA
SetWindowLongPtrW
SetWindowPos
SetWindowTextA
SetWindowTextW
SetWindowsHookExA
ShowWindow
SystemParametersInfoA
ToAscii
TrackPopupMenu
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UpdateWindow
VkKeyScanA
WaitForInputIdle
WindowFromPoint
wsprintfA
wsprintfW
WSAAsyncSelect
WSACleanup
WSAGetLastError
WSAStartup
accept
bind
closesocket
connect
gethostbyaddr
gethostbyname
gethostname
getpeername
getservbyname
getsockname
getsockopt
htons
inet_addr
inet_ntoa
ioctlsocket
listen
ntohs
recv
select
send
setsockopt
socket
TclKit_AppInit
TclKit_SetKitPath
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetACP
GetExitCodeProcess
LocalFree
CloseHandle
SizeofResource
VirtualProtect
QueryPerformanceFrequency
VirtualFree
GetFullPathNameW
ExitProcess
HeapAlloc
GetCPInfoExW
RtlUnwind
GetCPInfo
GetStdHandle
GetModuleHandleW
FreeLibrary
HeapDestroy
ReadFile
CreateProcessW
GetLastError
GetModuleFileNameW
SetLastError
FindResourceW
CreateThread
CompareStringW
LoadLibraryA
ResetEvent
GetVersion
RaiseException
FormatMessageW
SwitchToThread
GetExitCodeThread
GetCurrentThread
LoadLibraryExW
LockResource
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
VirtualQueryEx
Sleep
EnterCriticalSection
SetFilePointer
LoadResource
SuspendThread
GetTickCount
GetFileSize
GetStartupInfoW
GetFileAttributesW
InitializeCriticalSection
GetSystemWindowsDirectoryW
GetThreadPriority
SetThreadPriority
GetCurrentProcess
VirtualAlloc
GetSystemInfo
GetCommandLineW
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
HeapCreate
GetWindowsDirectoryW
VerSetConditionMask
GetDiskFreeSpaceW
FindFirstFileW
GetUserDefaultUILanguage
GetModuleFileNameA
lstrlenW
QueryPerformanceCounter
SetEndOfFile
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
SetEvent
CreateFileW
GetLocaleInfoW
GetSystemDirectoryW
DeleteFileW
GetLocalTime
GetEnvironmentVariableW
WaitForSingleObject
WriteFile
ExitThread
DeleteCriticalSection
TlsGetValue
GetDateFormatW
SetErrorMode
IsValidLocale
TlsSetValue
CreateDirectoryW
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
GetUserDefaultLangID
RemoveDirectoryW
CreateEventW
SetThreadLocale
GetThreadLocale
InitCommonControls
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
CreateWindowExW
TranslateMessage
CharLowerBuffW
CallWindowProcW
CharUpperW
PeekMessageW
GetSystemMetrics
SetWindowLongW
MessageBoxA
MessageBoxW
DestroyWindow
CharUpperBuffW
CharNextW
MsgWaitForMultipleObjects
LoadStringW
ExitWindowsEx
DispatchMessageW
SysAllocStringLen
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantClear
SysFreeString
SysReAllocStringLen
VariantChangeType
SafeArrayCreate
NetWkstaGetInfo
NetApiBufferFree
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegQueryValueExW
AdjustTokenPrivileges
GetTokenInformation
ConvertSidToStringSidW
LookupPrivilegeValueW
RegCloseKey
OpenProcessToken
RegOpenKeyExW
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ