Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
launcher.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
launcher.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
launcher.exe
Resource
android-x64-arm64-20240624-en
Target
launcher.exe
Size
7.6MB
MD5
9bc13e948ec33f6008679ad10fbc3134
SHA1
e20a48ba18e562bd509175b8c9b0249931f53010
SHA256
f1d5471c3efcf1793b4ee86bbd5616d74eaf7a5275997f32fab5153ddc50bebb
SHA512
824dd6edfd00d527d947c10f47362d825b0c93e9ddf2bd71625e4e0a3832d4f064dff3a6470b2ad49d7cf9fab8c6c4f44390bed8b89b98fd81db7493942c0b3e
SSDEEP
98304:HbuIfH5mjdr74F5lz9qvo8HPNktsJcdru:79KQ0/NAsJcQ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
d:\dagor2\launcher_builds\scilauncher2\war_thunder\launcher-dev.pdb
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
GetSecurityInfo
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
OpenProcessToken
AccessCheck
DuplicateToken
MapGenericMask
GetNamedSecurityInfoW
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegEnumKeyExA
DeregisterEventSource
RegisterEventSourceW
ReportEventW
ShellExecuteW
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteA
Shell_NotifyIconW
ord680
ShellExecuteExW
SHDeleteKeyA
StrStrIW
PathCanonicalizeA
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
inet_pton
sendto
WSASendTo
WSARecvFrom
WSASocketW
WSASend
WSARecv
WSAStringToAddressW
recvfrom
gethostname
inet_addr
shutdown
inet_ntoa
ioctlsocket
listen
accept
freeaddrinfo
getaddrinfo
__WSAFDIsSet
WSAIoctl
socket
setsockopt
getsockopt
getsockname
getpeername
connect
bind
recv
closesocket
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
WSAAddressToStringW
WSAGetLastError
WSASetLastError
gethostbyname
ntohl
htons
htonl
WSACleanup
WSAStartup
getservbyname
select
ntohs
CertEnumCertificatesInStore
CertFreeCertificateContext
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreA
CertCloseStore
if_nametoindex
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
MsgWaitForMultipleObjects
SetDlgItemTextW
GetDlgItem
PeekMessageW
DispatchMessageW
TranslateMessage
DrawIconEx
LoadImageW
GetMonitorInfoA
MonitorFromWindow
EnumWindows
GetWindowThreadProcessId
DestroyIcon
SetWindowTextA
LoadCursorA
FindWindowA
GetCursorPos
MessageBoxW
GetWindowRect
GetClientRect
GetMessageW
GetDC
ReleaseDC
GetWindowLongA
EnumDisplaySettingsA
CharLowerW
SendMessageW
DestroyWindow
ClipCursor
GetProcessWindowStation
RegisterWindowMessageA
RegisterWindowMessageW
SendMessageA
PostMessageA
DefWindowProcW
PostQuitMessage
RegisterClassExW
CreateWindowExW
ShowWindow
ShowWindowAsync
MoveWindow
SetWindowPos
GetAsyncKeyState
SetCapture
ReleaseCapture
SetWindowTextW
InvalidateRect
GetUserObjectInformationW
LoadIconA
LoadImageA
SetTimer
KillTimer
GetSystemMetrics
CreatePopupMenu
DestroyMenu
OpenClipboard
CloseClipboard
SetClipboardData
GetClipboardData
EmptyClipboard
SetWindowRgn
SetForegroundWindow
UpdateWindow
InsertMenuItemW
TrackPopupMenuEx
CoUninitialize
CoInitialize
OleInitialize
OleUninitialize
CoCreateInstance
GetTimeZoneInformation
GetConsoleOutputCP
FlushFileBuffers
HeapQueryInformation
HeapReAlloc
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
LoadLibraryExW
OutputDebugStringW
HeapAlloc
HeapFree
SetStdHandle
GetConsoleMode
GetCurrentDirectoryW
GetFullPathNameW
GetExitCodeProcess
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
HeapSize
SetConsoleCtrlHandler
GetCommandLineA
FreeLibraryAndExitThread
ExitThread
WriteConsoleW
GetCPInfo
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
LocalAlloc
GetSystemDirectoryW
lstrcmpW
RtlUnwind
PeekNamedPipe
LCMapStringEx
DecodePointer
EncodePointer
InitializeSListHead
GetStartupInfoW
UnhandledExceptionFilter
IsProcessorFeaturePresent
ExpandEnvironmentStringsW
GetSystemInfo
CreateFileMappingW
MapViewOfFileEx
UnmapViewOfFile
GlobalAlloc
GlobalUnlock
GlobalLock
ReadConsoleW
FormatMessageA
GetDriveTypeW
CreateMutexW
CancelIo
CreateHardLinkW
GetFileInformationByHandle
CreateWaitableTimerW
CreateSemaphoreExW
QueueUserAPC
CreateEventW
GetQueuedCompletionStatus
CreateIoCompletionPort
PostQueuedCompletionStatus
GetWindowsDirectoryA
ExpandEnvironmentStringsA
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
VirtualQueryEx
GetProcessId
CreateThread
CreateSemaphoreW
ReleaseSemaphore
ConvertThreadToFiber
ConvertFiberToThread
GlobalMemoryStatus
SystemTimeToFileTime
GetSystemTime
CreateFiber
DeleteFiber
SwitchToFiber
GetModuleHandleExW
PulseEvent
CreateMutexA
ReleaseMutex
VerifyVersionInfoW
GetLastError
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
LoadLibraryW
GetTickCount
GetCurrentProcess
TerminateProcess
CloseHandle
WaitForSingleObject
TerminateThread
CreateProcessW
GetVersionExA
GetNativeSystemInfo
GetGeoInfoA
GetUserGeoID
GetUserDefaultUILanguage
GetModuleHandleW
GetStdHandle
GetCommandLineW
GetEnvironmentVariableW
SetEnvironmentVariableW
SetCurrentDirectoryW
CreateFileA
GetFileAttributesExW
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetCurrentThreadId
GetWindowsDirectoryW
GetModuleFileNameW
LocalFree
AttachConsole
HeapSetInformation
GetProcessHeaps
K32GetProcessMemoryInfo
CreateFileW
SetUnhandledExceptionFilter
GetCurrentProcessId
ExitProcess
MultiByteToWideChar
VirtualQuery
IsDebuggerPresent
SwitchToThread
GetLocalTime
GetVersionExW
GetModuleFileNameA
CreateToolhelp32Snapshot
Module32First
Module32Next
K32GetModuleInformation
WriteFile
OutputDebugStringA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
TryEnterCriticalSection
DeleteCriticalSection
RtlCaptureContext
IsBadReadPtr
IsBadCodePtr
TlsGetValue
TlsSetValue
SleepEx
MoveFileExW
WideCharToMultiByte
SetThreadPriority
SetThreadAffinityMask
OpenThread
SuspendThread
ResumeThread
GetThreadContext
Thread32First
Thread32Next
RaiseException
GetCurrentThread
GetThreadId
GetProcessAffinityMask
TlsAlloc
TlsFree
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventA
SetErrorMode
CreateDirectoryW
FlushInstructionCache
GlobalMemoryStatusEx
VirtualAlloc
WriteProcessMemory
VirtualFree
DeleteFileW
GetFileSizeEx
GetFileType
GetFileTime
ReadFile
SetFilePointerEx
WaitForMultipleObjects
FindClose
FindFirstFileW
FindNextFileW
GetDiskFreeSpaceExW
GetFileAttributesW
RemoveDirectoryW
SetFileTime
GetTempPathA
QueryDosDeviceA
CopyFileW
MoveFileW
GetVolumeInformationA
SetWaitableTimer
CreateWaitableTimerA
InitializeCriticalSection
GetVolumeInformationW
SetEndOfFile
SetFilePointer
DeviceIoControl
OpenProcess
K32GetProcessImageFileNameW
Process32First
Process32Next
GetOverlappedResult
SetFileAttributesW
SetLastError
FormatMessageW
InitializeCriticalSectionEx
GetSystemDirectoryA
MoveFileExA
CompareFileTime
GetSystemTimeAsFileTime
GetEnvironmentVariableA
VerSetConditionMask
CreateFontA
GetDeviceCaps
GetObjectA
SelectObject
BitBlt
OffsetRgn
DeleteObject
CreateRectRgn
timeBeginPeriod
waveOutClose
waveOutPause
waveOutRestart
waveOutUnprepareHeader
timeGetTime
SymInitialize
SymSetSearchPath
SymLoadModule
MiniDumpWriteDump
SymGetModuleInfo
SymGetLineFromAddr
SymUnDName
SymGetSymFromAddr
SymSetOptions
UnDecorateSymbolName
InitCommonControlsEx
AcceptEx
GetAcceptExSockaddrs
BCryptGenRandom
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ