Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Behavioral task
behavioral1
Sample
HDD_Regenerator~/HDD_Regenerator_2011_DC_2013-05-08/HDD_Regenerator_2011_DC_2013-05-08/Crack/Keygen.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
HDD_Regenerator~/HDD_Regenerator_2011_DC_2013-05-08/HDD_Regenerator_2011_DC_2013-05-08/Crack/Keygen.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
HDD_Regenerator~/HDD_Regenerator_2011_DC_2013-05-08/HDD_Regenerator_2011_DC_2013-05-08/Crack/Patch.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
HDD_Regenerator~/HDD_Regenerator_2011_DC_2013-05-08/HDD_Regenerator_2011_DC_2013-05-08/Crack/Patch.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
HDD_Regenerator~/HDD_Regenerator_2011_DC_2013-05-08/HDD_Regenerator_2011_DC_2013-05-08/hr.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
HDD_Regenerator~/HDD_Regenerator_2011_DC_2013-05-08/HDD_Regenerator_2011_DC_2013-05-08/hr.exe
Resource
win10v2004-20241007-en
Target
25d4423ae11aea36078f28908e4415e008b9acead9171e2163355af4b2829172
Size
7.8MB
MD5
fba66c6796c1c307b1ab2b9eb1a63664
SHA1
18452ada848a71baba4a6edd539a78b64d93b60b
SHA256
25d4423ae11aea36078f28908e4415e008b9acead9171e2163355af4b2829172
SHA512
87862b69e34999fc7948e6f12eab9ecf570efd73e248ecafc506eff491b1636c3710b378696cca690b4774ff330d8261fc16e707a06e712be5a547e7758a5ac6
SSDEEP
196608:nOPHgeQfE/YRZ9ux55tqhbpudHc0dWRw4NZo7yOEv4MW48GaA:nKHgbfiYRus7un4NZo7r8Lf
resource | yara_rule |
---|---|
static1/unpack001/HDD_Regenerator~/HDD_Regenerator_2011_DC_2013-05-08/HDD_Regenerator_2011_DC_2013-05-08/Crack/Keygen.exe | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
unpack001/HDD_Regenerator~/HDD_Regenerator_2011_DC_2013-05-08/HDD_Regenerator_2011_DC_2013-05-08/Crack/Keygen.exe |
unpack001/HDD_Regenerator~/HDD_Regenerator_2011_DC_2013-05-08/HDD_Regenerator_2011_DC_2013-05-08/Crack/Patch.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteFileA
ExitProcess
FindResourceA
FreeLibrary
GetModuleHandleA
GetProcAddress
GetTempPathA
LoadLibraryA
LoadResource
RtlMoveMemory
SizeofResource
VirtualAlloc
lstrcatA
CloseHandle
CreateFileA
FlushFileBuffers
WriteFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
SHGetPathFromIDListW
SHBrowseForFolderW
SHFileOperationW
ShellExecuteExW
SHGetSpecialFolderLocation
ShellExecuteW
CommandLineToArgvW
SHGetMalloc
ord17
lstrcpyW
GetWindowsDirectoryW
SetErrorMode
GetTempPathW
ExpandEnvironmentStringsW
LockResource
SizeofResource
LoadResource
FindResourceW
GetTickCount
GetExitCodeThread
CreateThread
CopyFileW
InterlockedIncrement
InterlockedDecrement
QueryPerformanceFrequency
CreateEventW
lstrcatW
GetTempFileNameW
CompareStringA
CompareStringW
GetVersionExW
LoadLibraryW
FreeLibrary
GetProcAddress
lstrcmpW
lstrcmpiW
GetSystemDefaultLCID
GlobalHandle
VerLanguageNameW
MoveFileW
SetCurrentDirectoryW
FindClose
FindNextFileW
CompareFileTime
FindFirstFileW
GetSystemTimeAsFileTime
SetFileAttributesW
LocalFree
FormatMessageW
GetSystemInfo
MulDiv
IsValidCodePage
GetVersion
GetModuleHandleW
GetCommandLineW
GetFileAttributesW
IsBadReadPtr
VirtualQuery
lstrcmpiA
lstrcpyA
FlushFileBuffers
SetEndOfFile
GetDiskFreeSpaceW
GetDriveTypeW
CreateDirectoryW
GetExitCodeProcess
GetCurrentThread
GetLocaleInfoW
QueryPerformanceCounter
SetEvent
ResetEvent
VirtualProtect
GetCurrentProcessId
CreateProcessW
MultiByteToWideChar
GetDateFormatW
GetTimeFormatW
GetLocalTime
GetProcessTimes
OpenProcess
lstrlenW
SetEnvironmentVariableA
GetOEMCP
GetACP
GetTimeZoneInformation
SetStdHandle
SetConsoleCtrlHandler
LoadLibraryA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidLocale
GetCPInfo
GetStringTypeW
GetStringTypeA
IsBadCodePtr
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCommandLineA
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
FatalAppExitA
TlsGetValue
GetDateFormatA
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
HeapReAlloc
GetStartupInfoW
GetModuleHandleA
TerminateProcess
RaiseException
RtlUnwind
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSection
EnterCriticalSection
lstrcmpA
GetTimeFormatA
CreateFileA
WaitForSingleObject
ExitProcess
GetCurrentProcess
DuplicateHandle
GetThreadContext
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
SetThreadContext
ResumeThread
DeleteFileW
Sleep
RemoveDirectoryW
SetFilePointer
GetProcessHeap
HeapAlloc
HeapFree
WriteFile
lstrcpynW
FindResourceExW
GetModuleFileNameW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrlenA
CreateFileW
GetFileSize
GlobalAlloc
CloseHandle
GlobalLock
ReadFile
GlobalUnlock
GlobalFree
GetLastError
SetLastError
SearchPathW
WideCharToMultiByte
SystemTimeToFileTime
lstrcpynA
LocalAlloc
LoadLibraryExW
GetClassInfoW
UpdateWindow
SetCursor
GetWindow
GetDlgItemTextW
SetFocus
EnableWindow
GetParent
GetWindowTextLengthW
GetWindowTextW
MoveWindow
SetWindowTextW
GetWindowPlacement
DestroyIcon
GetDlgCtrlID
FillRect
GetSysColor
GetSysColorBrush
IsDialogMessageW
SendMessageW
GetWindowRect
GetSystemMetrics
SetRect
FindWindowW
IntersectRect
SubtractRect
IsWindow
DestroyWindow
wvsprintfW
WaitForInputIdle
GetWindowLongW
BeginPaint
EndPaint
SetWindowLongW
GetClientRect
ClientToScreen
SetWindowPos
GetWindowDC
EndDialog
GetDlgItem
ShowWindow
GetDesktopWindow
wsprintfW
MsgWaitForMultipleObjects
PeekMessageW
MessageBoxW
CreateDialogIndirectParamW
CreateDialogParamW
DialogBoxIndirectParamW
DialogBoxParamW
DefWindowProcW
PostMessageW
KillTimer
PostQuitMessage
SetTimer
LoadIconW
LoadCursorW
RegisterClassW
CreateWindowExW
GetMessageW
TranslateMessage
DispatchMessageW
GetDC
ReleaseDC
LoadStringW
CharPrevW
ExitWindowsEx
SendDlgItemMessageW
CharNextW
SetDlgItemTextW
CharUpperW
DrawIcon
CreateFontW
GetTextExtentPoint32W
SetBkMode
SetTextColor
GetObjectW
CreateFontIndirectW
CreateSolidBrush
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
DeleteObject
GetStockObject
GetSystemPaletteEntries
CreatePalette
GetDeviceCaps
SelectPalette
RealizePalette
CreateDIBitmap
TranslateCharsetInfo
RegDeleteKeyW
RegEnumKeyW
RegOpenKeyW
RegCreateKeyW
RegQueryValueExA
RegOpenKeyExA
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
RegEnumValueW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegEnumKeyExW
CLSIDFromProgID
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CoInitializeSecurity
CreateItemMoniker
GetRunningObjectTable
ProgIDFromCLSID
StringFromGUID2
CoUninitialize
CoInitialize
CoCreateGuid
VariantChangeType
VariantClear
SysAllocString
SysStringLen
SysReAllocStringLen
CreateErrorInfo
RegisterTypeLi
LoadTypeLi
SetErrorInfo
GetErrorInfo
SysFreeString
SysAllocStringLen
UuidFromStringW
RpcStringFreeW
UuidToStringW
UuidCreate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ