Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
Crack.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Crack.exe
Resource
win10v2004-20240802-en
Target
Crack.exe
Size
5.2MB
MD5
d6ee77649df41b5ff35f4a271d246775
SHA1
36c65c0bef1926071222ead1bcc450f240aaa3a4
SHA256
98fca0719314d9424f534a149f884f18c524052ca5e43981dfd4ac28be3fe947
SHA512
ed81ce087797300408b61b76754f4da11708a7bdbebda201c5e827d240297680106c14f94e8ce0d7eed4c5b71c245ee7f2bbd023e6f10780026c4465e0260155
SSDEEP
49152:9eVaZoX/2msfXt0YxWANs9f06UR9a2FMiHwhf7eHqTLP1LzA6eBihL67Sy5BpNTh:cKXmsfXa0WfDFUvwhfWOLR4
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\builds\ACC\GM\source\dev\target\win32\Release\HDCore\Set-up.pdb
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
CM_Get_DevNode_Status
SetupDiGetDeviceInstanceIdW
CommandLineToArgvW
SHGetPathFromIDListW
SHGetMalloc
ord680
SHBrowseForFolderW
SHGetSpecialFolderLocation
ord51
SHCreateDirectoryExW
ShellExecuteExW
SHGetKnownFolderPath
ShellExecuteW
SHGetFolderPathW
SHGetSpecialFolderPathW
SHGetFolderLocation
PathFindFileNameW
PathIsRelativeW
PathStripToRootW
PathStripPathW
PathRemoveBackslashW
PathRenameExtensionW
PathRemoveFileSpecW
PathIsDirectoryW
PathAppendW
UrlIsW
PathFileExistsA
PathFileExistsW
PathIsFileSpecW
PathIsNetworkPathW
PathRemoveExtensionW
PathAddExtensionW
PathIsUNCW
RaiseException
LoadLibraryW
GetProcAddress
LocalFree
CreateProcessW
GetModuleHandleW
FreeLibrary
FindFirstFileW
FindNextFileW
TerminateProcess
RemoveDirectoryW
GetModuleFileNameW
FindClose
WaitForSingleObject
OpenProcess
SetFileAttributesW
CreateToolhelp32Snapshot
Sleep
GetLastError
Process32NextW
DeleteFileW
Process32FirstW
CopyFileW
GetExitCodeProcess
ReadFile
SetLastError
lstrlenW
LocalAlloc
GetFileAttributesW
FormatMessageW
GetDiskFreeSpaceExW
GetCurrentDirectoryW
SetCurrentDirectoryW
MoveFileExW
GetFileSize
lstrcpyW
lstrcmpiW
lstrcmpW
GetDriveTypeW
InitializeCriticalSectionEx
DecodePointer
DeleteCriticalSection
GetFullPathNameW
HeapSize
HeapReAlloc
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
GetSystemDirectoryW
SetDllDirectoryW
GetStdHandle
AttachConsole
FreeConsole
GetConsoleWindow
CreateMutexW
ReleaseMutex
InitializeCriticalSectionAndSpinCount
AreFileApisANSI
HeapCreate
WriteFile
InterlockedCompareExchange
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
InitializeCriticalSection
SetFilePointer
GetFullPathNameA
SetEndOfFile
UnlockFileEx
UnmapViewOfFile
HeapValidate
GetTempPathA
GetDiskFreeSpaceA
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
CreateFileA
LoadLibraryA
GetVersionExA
DeleteFileA
GetSystemInfo
HeapCompact
UnlockFile
LockFileEx
GetCurrentProcessId
SystemTimeToFileTime
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
CreateSymbolicLinkW
GetUserDefaultUILanguage
CreateEventW
SetEvent
ResetEvent
TryEnterCriticalSection
CreateDirectoryW
GetFileSizeEx
GetLocalTime
GetTimeFormatW
GetNativeSystemInfo
OpenMutexW
ReleaseSemaphore
OpenSemaphoreW
CreateSemaphoreW
InterlockedDecrement
QueryPerformanceFrequency
CreateThread
SetFilePointerEx
TerminateThread
ResumeThread
GlobalFree
SizeofResource
LockResource
LoadResource
FindResourceW
VerSetConditionMask
VerifyVersionInfoW
GetUserDefaultLCID
LCMapStringW
DuplicateHandle
ProcessIdToSessionId
FindResourceExW
GetThreadTimes
QueryFullProcessImageNameW
WaitForMultipleObjects
GetUserDefaultLangID
SetNamedPipeHandleState
CreateNamedPipeW
ConnectNamedPipe
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
GetTimeZoneInformation
QueryDepthSList
InterlockedFlushSList
LoadLibraryExW
GetModuleHandleA
FreeLibraryAndExitThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetStdHandle
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLocaleInfoW
CompareStringW
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCurrentThread
WaitForSingleObjectEx
GetStringTypeW
EncodePointer
LoadLibraryExA
VirtualQuery
VirtualProtect
CloseHandle
GetVersionExW
CreateFileW
GetTempPathW
DeviceIoControl
GetModuleHandleExW
ExitProcess
GetACP
IsValidLocale
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
GetConsoleCP
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
GetFileType
RtlUnwind
WriteConsoleW
GetDateFormatW
UnregisterWaitEx
CreateFileMappingA
GetWindowThreadProcessId
GetWindowLongW
wsprintfW
GetWindowTextLengthW
GetMessageW
DefWindowProcW
PostThreadMessageW
EnumWindows
GetShellWindow
AllowSetForegroundWindow
LoadImageW
SystemParametersInfoW
EnableMenuItem
CallWindowProcW
PostMessageW
GetWindow
GetFocus
DestroyWindow
LoadIconW
GetSystemMetrics
GetSystemMenu
GetClassLongW
AppendMenuW
FillRect
CreateWindowExW
ScreenToClient
SetWindowTextW
RegisterClassExW
GetActiveWindow
ShowWindow
IsWindow
InvalidateRgn
DispatchMessageW
RedrawWindow
ClientToScreen
DestroyAcceleratorTable
IsChild
AttachThreadInput
GetSysColor
GetForegroundWindow
MoveWindow
CreateAcceleratorTableW
CharNextW
BringWindowToTop
TranslateAcceleratorW
TranslateMessage
LoadCursorW
GetClassNameW
SetCapture
SetWindowLongW
GetClientRect
GetDlgItem
PostQuitMessage
GetClassInfoExW
GetParent
RegisterWindowMessageW
ReleaseCapture
SetForegroundWindow
InvalidateRect
IsIconic
BeginPaint
EndPaint
GetWindowTextW
GetWindowRect
GetDC
SetWindowPos
MessageBoxW
SendMessageW
GetDesktopWindow
ReleaseDC
UnregisterClassW
GetAsyncKeyState
SetClassLongW
SetFocus
DeleteDC
GetObjectW
GetStockObject
CreateSolidBrush
GetDeviceCaps
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
BitBlt
DeleteObject
EqualSid
RegOpenKeyExW
LookupAccountSidW
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
SystemFunction036
RegQueryValueExW
GetUserNameW
DuplicateTokenEx
ConvertSidToStringSidW
ImpersonateLoggedOnUser
ConvertStringSidToSidW
RevertToSelf
RegCreateKeyExW
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
CreateWellKnownSid
GetTokenInformation
GetNamedSecurityInfoW
SetNamedSecurityInfoW
SetEntriesInAclW
RegFlushKey
RegSetValueExW
InitializeSecurityDescriptor
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
CoAddRefServerProcess
CoReleaseServerProcess
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoInitialize
OleLockRunning
CLSIDFromString
OleInitialize
CreateStreamOnHGlobal
CLSIDFromProgID
CoTaskMemAlloc
OleUninitialize
CoGetClassObject
CoCreateInstance
StringFromGUID2
CoTaskMemFree
CoCreateGuid
OleRun
VariantClear
SysAllocStringLen
SysStringLen
SysAllocString
OleCreateFontIndirect
LoadTypeLi
VariantInit
LoadRegTypeLi
SysAllocStringByteLen
VariantChangeType
VariantCopy
SysStringByteLen
DispCallFunc
SysFreeString
GetErrorInfo
BCryptFinishHash
BCryptCreateHash
BCryptHashData
BCryptDestroyHash
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptGetProperty
GetUserNameExW
CertGetIssuerCertificateFromStore
CertGetNameStringW
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WinVerifyTrust
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ