Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
DiscordSetup (2).exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DiscordSetup (2).exe
Resource
win10v2004-20240709-en
Target
DiscordSetup (2).exe
Size
55.3MB
MD5
7799bd31109df97c5d3c1e863f14b3a9
SHA1
f71d1561190def0a6d27800e78cf6908730e7946
SHA256
29362d101c2470d880c2a43433004e2de12b3590361f88e30f573d0d0f3878e0
SHA512
50a80f11bba0817bf5d75dfbc390ba5bf7c1620ebd173060fcca0878768b025eca77a9e8207cbbc52263fcc07f3086c1d38668e2fb7f9ec805d601aba786b2b2
SSDEEP
1572864:lfkpX+X6CZDRLFdMEwIqFVMFfUeYpv4+Av:lfQcdFdMFCTYF4Z
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\tmp\squirrel\-2031866428\src\Setup\bin\Release\Setup.pdb
InitializeCriticalSectionEx
FreeResource
LoadResource
FindResourceW
SizeofResource
LockResource
CreateDirectoryW
LocalFree
CopyFileW
GetFileAttributesW
CreateFileW
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
WideCharToMultiByte
WriteFile
SetFileTime
CreateProcessW
lstrcmpiW
LeaveCriticalSection
RaiseException
EnterCriticalSection
LoadLibraryExW
GetCurrentThreadId
DecodePointer
FreeLibrary
SetEndOfFile
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
GetStringTypeW
SetStdHandle
LoadLibraryW
GetCurrentProcess
GetModuleFileNameW
DeleteFileW
CloseHandle
GetExitCodeProcess
WaitForSingleObject
MoveFileW
GetTempFileNameW
GetLastError
GetTempPathW
lstrlenW
DeleteCriticalSection
GetModuleHandleW
GetProcAddress
VerSetConditionMask
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
ReadConsoleW
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetConsoleMode
GetConsoleCP
HeapReAlloc
OutputDebugStringW
VerifyVersionInfoW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
HeapFree
HeapAlloc
GetFileType
CompareStringW
LCMapStringW
HeapSize
CharNextW
DestroyWindow
LoadStringW
ExitWindowsEx
GetActiveWindow
MessageBoxW
wsprintfW
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
GetTokenInformation
GetUserNameW
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoCreateInstance
CoUninitialize
VariantInit
VarUI4FromStr
SysFreeString
SysAllocString
VariantClear
URLDownloadToFileW
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ