Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
CaptchaBotRS.Setup.2.2.6.exe
Resource
win7-20231129-de
Behavioral task
behavioral2
Sample
CaptchaBotRS.Setup.2.2.6.exe
Resource
win10v2004-20240508-de
Target
CaptchaBotRS.Setup.2.2.6.exe
Size
98.1MB
MD5
558f775d17005158d7e1563589a89d2d
SHA1
38cbb351c4c918d0c57faddfc1de0b48631901a2
SHA256
c4a954a4f4f0b1432eb0cc59403a6d440022aa3f05a681e913a0d8a4558685dd
SHA512
b9fb94d18d0565ea73732108db89cfe2023efc859876a0f208b14f6f913e901fbf0bb0ec67a5396745c8414493ad055a368a2bc53021d3e03e779e06b544ba6f
SSDEEP
1572864:8G05bN/nb4pzpcpXoQZ7Uw7nqU2JqfEYwLqYKt3ixBvf+VpGGo0PTKdh7UQLLiCw:8G0tN/A4FnqaiKt3iPH+7GHWTKdhtU
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\projects\squirrel-windows\src\Setup\bin\Release\Setup.pdb
GetCurrentProcess
LoadLibraryW
FreeLibrary
InitializeCriticalSectionEx
GetFileAttributesW
CreateFileW
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
WideCharToMultiByte
CreateDirectoryW
WriteFile
SetFileTime
FreeResource
SizeofResource
LockResource
CreateProcessW
GetCurrentThreadId
DecodePointer
RaiseException
LeaveCriticalSection
EnterCriticalSection
lstrcmpiW
LoadLibraryExW
SetFilePointerEx
GetModuleFileNameW
GetConsoleCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
DeleteFileW
CloseHandle
GetExitCodeProcess
WaitForSingleObject
MoveFileW
GetTempFileNameW
GetLastError
GetTempPathW
DeleteCriticalSection
GetModuleHandleW
GetProcAddress
lstrlenW
FindResourceW
LoadResource
VerSetConditionMask
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
WriteConsoleW
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
HeapSize
GetConsoleMode
VerifyVersionInfoW
IsDebuggerPresent
OutputDebugStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
HeapFree
HeapAlloc
GetFileType
CompareStringW
LCMapStringW
CharNextW
ExitWindowsEx
wsprintfW
MessageBoxW
DestroyWindow
LoadStringW
GetActiveWindow
GetUserNameW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
GetTokenInformation
RegCloseKey
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegSetValueExW
RegQueryValueExW
SHGetFolderPathW
ShellExecuteExW
ShellExecuteW
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoInitialize
VariantInit
SysFreeString
SysAllocString
VarUI4FromStr
VariantClear
URLDownloadToFileW
PathIsUNCW
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ