Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
ToonBoom storyboard By Dokha.rar
Resource
win11-20241007-en
Target
ToonBoom storyboard By Dokha.rar
Size
328.1MB
MD5
14f0fbe135f96ae0edbeb7b9d750a7e8
SHA1
bf072a8898f2511434c67a385018ae5c7f0d6afd
SHA256
9335569661332b5e4df69c1f932d01d43643c8a7799bc290c916a96a66a4a4e6
SHA512
3b5e3b1709c2129c611b71370395440e4a42b07b906a241812671defb07b9b895721651d7157e0d193faf79597eb3483e6419d3697ba27633737badcbc99a69a
SSDEEP
6291456:fNuMjYQ6LW4QOjxCsgIYtA6UV8OT51hY+YD7snjhU4cmEpvSfWPbr1kOLy:VxX6YsgJtA7dNXYXArcmEAWPbr1Pu
Checks for missing Authenticode signature.
resource |
---|
unpack001/Toonboom Storyboard Pro 20.1 v21.1.0.18395 (x64) Multilingual [FileCR]/Toonboom Storyboard Pro 20.1 v21.1.0.18395 (x64) Multilingual/Toon_Boom_StoryBoard_21-1_Search&Patch_Activation_v2.exe |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\CodeBases\isdev\redist\Language Independent\i386\setup.pdb
ord17
LoadLibraryW
lstrcmpW
lstrcmpiW
GetSystemDefaultLangID
GetUserDefaultLangID
VerLanguageNameW
CompareFileTime
CreateDirectoryW
FindClose
FindFirstFileW
FindNextFileW
SetFileAttributesW
GetSystemTimeAsFileTime
GetPrivateProfileStringW
MoveFileW
LocalFree
FormatMessageW
GetSystemInfo
MulDiv
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadLibraryExW
GetVersion
GetLocalTime
IsValidLocale
GetCommandLineW
GetFileAttributesW
GlobalAlloc
GlobalFree
FlushFileBuffers
VirtualQuery
IsBadReadPtr
GetDiskFreeSpaceExW
GetDriveTypeW
GetExitCodeProcess
GetCurrentThread
GetLocaleInfoW
InterlockedExchange
LoadLibraryExA
GetModuleHandleW
GetProcAddress
GetSystemDirectoryA
LoadLibraryA
GetLastError
SetLastError
CreateFileW
GetFileSize
CloseHandle
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
ReadFile
SetFilePointer
WriteFile
HeapAlloc
lstrcmpA
SystemTimeToFileTime
ResetEvent
SetEvent
FindResourceExW
SetFileTime
OpenProcess
GetProcessTimes
ReadConsoleW
WriteConsoleW
SetStdHandle
GetCurrentDirectoryW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetTimeFormatW
GetDateFormatW
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
HeapReAlloc
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
FreeLibrary
CompareStringA
CompareStringW
lstrcatW
GetVersionExW
InterlockedDecrement
InterlockedIncrement
CreateEventW
QueryPerformanceFrequency
GetTempFileNameW
CopyFileW
GetTickCount
GetExitCodeThread
CreateThread
FindResourceW
GlobalUnlock
GlobalLock
SizeofResource
LockResource
LoadResource
lstrcpyW
SetErrorMode
GetTempPathW
ExpandEnvironmentStringsW
MoveFileExW
WriteProcessMemory
VirtualProtectEx
GetWindowsDirectoryW
GetSystemDirectoryW
FlushInstructionCache
SetThreadContext
GetThreadContext
CreateProcessW
ResumeThread
TerminateProcess
ExitProcess
GetCurrentProcess
Sleep
WaitForSingleObject
DuplicateHandle
RemoveDirectoryW
DeleteFileW
SetCurrentDirectoryW
lstrlenW
lstrcpynW
GetModuleFileNameW
GetProcessHeap
HeapFree
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetCurrentThreadId
HeapSize
GetModuleHandleExW
GetStdHandle
GetFullPathNameW
IsProcessorFeaturePresent
IsDebuggerPresent
RtlUnwind
LCMapStringW
DecodePointer
EncodePointer
PostMessageW
DispatchMessageW
TranslateMessage
GetMessageW
DefWindowProcW
PostQuitMessage
RegisterClassW
CharPrevW
SendDlgItemMessageW
wvsprintfW
LoadImageW
CreateDialogParamW
MoveWindow
SetCursor
GetWindow
GetDlgItemTextW
SetFocus
EnableWindow
SetForegroundWindow
SetActiveWindow
SetDlgItemTextW
IsDialogMessageW
FindWindowW
SubtractRect
IntersectRect
SetRect
FillRect
GetSysColorBrush
GetSysColor
GetWindowRect
GetDC
GetSystemMetrics
GetDlgCtrlID
CreateDialogIndirectParamW
DestroyWindow
IsWindow
SendMessageW
MessageBoxW
CharNextW
WaitForInputIdle
SetWindowLongW
GetWindowLongW
GetClientRect
EndPaint
BeginPaint
ReleaseDC
GetWindowDC
SetWindowPos
SetWindowTextW
GetDlgItem
ExitWindowsEx
CharUpperW
EndDialog
DialogBoxIndirectParamW
ShowWindow
GetDesktopWindow
MsgWaitForMultipleObjects
PeekMessageW
wsprintfW
LoadIconW
LoadCursorW
KillTimer
SetTimer
CreateWindowExW
TranslateCharsetInfo
UnrealizeObject
CreateHalftonePalette
GetDIBColorTable
SelectPalette
RealizePalette
GetSystemPaletteEntries
CreatePalette
CreateFontW
GetObjectW
SetTextColor
SetBkMode
GetDeviceCaps
CreateSolidBrush
CreateFontIndirectW
SetStretchBltMode
StretchBlt
SelectObject
DeleteDC
CreateDIBitmap
CreateCompatibleDC
BitBlt
DeleteObject
GetStockObject
GetTokenInformation
RegOpenKeyExW
RegOpenKeyW
RegOverridePredefKey
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCloseKey
FreeSid
EqualSid
AllocateAndInitializeSid
OpenThreadToken
OpenProcessToken
SetEntriesInAclW
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CreateWellKnownSid
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegEnumValueW
RegCreateKeyExW
RegDeleteValueW
RegQueryValueExW
SHGetMalloc
SHGetPathFromIDListW
SHGetFolderPathW
SHBrowseForFolderW
ShellExecuteW
CommandLineToArgvW
ShellExecuteExW
CoCreateInstance
CoCreateGuid
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemRealloc
CoInitialize
CoInitializeSecurity
CoUninitialize
CoTaskMemFree
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
SysAllocStringLen
SysFreeString
SysReAllocStringLen
SysStringLen
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VarBstrCat
VarBstrFromDate
VariantClear
VariantChangeType
GetErrorInfo
VarUI4FromStr
SystemTimeToVariantTime
PathFileExistsW
RpcStringFreeW
UuidCreate
UuidToStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ