Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
TrapcodeSuiteInstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TrapcodeSuiteInstaller.exe
Resource
win10v2004-20240802-en
Target
TrapcodeSuiteInstaller.exe
Size
2.7MB
MD5
1c171fd738312f57aff6efd56eb591ef
SHA1
b73b107a72b982eedc1778ad20038cbde7549aa1
SHA256
a32d84c886ed641357a136d95cfba7095b08850a33e834998a7df738f70fab43
SHA512
e24ecb56c92b666e646029200bf360f109b49972df03665fe0b7957cf42c923be7c2d260561b7f30e2ba864fcde77b55778166b26106e2c6118a3480b2eab738
SSDEEP
49152:TQCtQyJ+yozAf6NOf7OKEE8J030T4WhnOZ6LrS0JZE0wb9sMnj:VhEEaNanj
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\rg\GitLab-Runner\builds\release-2025-0-0-1-0-TrapcodeSuite\stage\Trapcode Suite Installer.pdb
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerifyVersionInfoW
VerSetConditionMask
SetLastError
CreateDirectoryW
CreateFileW
CreateProcessW
GetCurrentProcess
FreeLibrary
GetProcAddress
lstrcmpiW
FindResourceW
LoadLibraryExW
GetModuleFileNameW
GetCommandLineW
CreateMutexA
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FindClose
FindFirstFileA
FindNextFileA
OutputDebugStringA
lstrcpyA
lstrcatA
lstrlenA
AcquireSRWLockExclusive
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
SetEnvironmentVariableW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetModuleHandleW
GetTimeFormatW
GetDateFormatW
GetFileSizeEx
GetConsoleOutputCP
GetStdHandle
GetTimeZoneInformation
ExitProcess
DuplicateHandle
GetModuleHandleExW
FreeLibraryAndExitThread
QueryPerformanceCounter
ExitThread
CreateThread
ReadConsoleW
GetConsoleMode
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetDriveTypeW
RtlPcToFileHeader
RtlUnwindEx
AreFileApisANSI
MoveFileExW
CopyFileExW
CreateDirectoryExW
DeviceIoControl
SetFilePointerEx
SetEndOfFile
GetFullPathNameW
GetFileTime
GetFileInformationByHandle
GetFileAttributesExW
GetFileAttributesW
FlushFileBuffers
GetCurrentThreadId
LoadResource
LockResource
FreeResource
GetSystemDefaultLocaleName
GetModuleHandleA
GetCurrentDirectoryA
FindResourceA
GetUserDefaultLocaleName
SizeofResource
CompareStringW
GetModuleFileNameA
CreateProcessA
QueryPerformanceFrequency
GetACP
WaitForSingleObject
GetEnvironmentVariableW
CreatePipe
SetHandleInformation
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateFileA
Sleep
WriteFile
WaitNamedPipeA
SetNamedPipeHandleState
ReadFile
FormatMessageA
RemoveDirectoryA
LocalFree
FormatMessageW
MultiByteToWideChar
WideCharToMultiByte
K32GetModuleFileNameExA
K32EnumProcessModules
K32EnumProcesses
CloseHandle
GetExitCodeProcess
OpenProcess
LCIDToLocaleName
GetThreadLocale
GetProcessHeap
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
ReleaseSRWLockExclusive
InitializeSRWLock
LoadLibraryExA
VirtualFree
DeleteFileW
GetCurrentDirectoryW
GetCurrentProcessId
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InitializeCriticalSectionEx
HeapFree
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetCPInfo
CompareStringEx
GetStringTypeW
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
RtlUnwind
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
GetLocaleInfoEx
GetSystemTimeAsFileTime
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
LCMapStringEx
GetExitCodeThread
WaitForSingleObjectEx
IsDebuggerPresent
TryEnterCriticalSection
UnregisterClassW
SendMessageTimeoutA
GetClientRect
IsWindowEnabled
CopyRect
DrawTextA
FillRect
CharNextW
InvalidateRect
SendMessageW
LoadBitmapW
SetRect
BeginPaint
EndPaint
DefWindowProcW
SetWindowLongPtrW
GetWindowLongPtrW
CallWindowProcW
LoadIconW
DestroyWindow
PostQuitMessage
GetWindowRect
KillTimer
MoveWindow
GetTopWindow
GetWindow
ShowWindow
CreateWindowExW
RedrawWindow
SendMessageA
SetWindowPos
MapWindowPoints
GetParent
GetMonitorInfoW
MonitorFromWindow
GetWindowLongW
GetActiveWindow
RegisterClassExW
GetClassInfoExW
LoadCursorW
MessageBoxA
MessageBeep
EnableWindow
SetTimer
TranslateMessage
DispatchMessageW
PeekMessageW
GetMessageW
CreateFontIndirectA
CreateSolidBrush
GetObjectW
BitBlt
DeleteObject
CreateCompatibleDC
SetBkColor
SetTextColor
SelectObject
SetBkMode
DeleteDC
GetSaveFileNameW
GetOpenFileNameW
GetSecurityInfo
RegOpenKeyExA
OpenProcessToken
GetTokenInformation
RegGetValueA
RegEnumKeyExA
RegCloseKey
RegSetValueExA
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
FreeSid
SetSecurityInfo
SetEntriesInAclW
AllocateAndInitializeSid
RegSetKeyValueA
CloseServiceHandle
OpenServiceA
OpenSCManagerW
GetUserNameW
RegCreateKeyExA
ShellExecuteA
CommandLineToArgvW
SHGetFolderPathA
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoInitialize
VarUI4FromStr
InitCommonControlsEx
BCryptGenRandom
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
GdipDeleteBrush
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipCreatePath
GdipAlloc
GdipResetPath
GdipClosePathFigure
GdipAddPathArcI
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipSetPageUnit
GdipDrawPath
GdipFillRectangleI
GdipFillPath
GdiplusStartup
GdiplusShutdown
GdipFree
GdipCloneBrush
GdipDeletePath
GdipCreateSolidFill
GetUserNameExA
WSACleanup
WSAGetLastError
inet_addr
WSAStartup
gethostbyname
gethostbyaddr
socket
htons
closesocket
sendto
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ