Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
IDM Activation Script 1.2.cmd
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
IDM Activation Script 1.2.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
IDM_6.4x_Crack_v19.7.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
IDM_6.4x_Crack_v19.7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
idman642build11f.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
idman642build11f.exe
Resource
win10v2004-20241007-en
Target
bd257601a2e601e8dd72158039b8b9e57d2bb6faba8f7953b80547c0ace22447
Size
11.6MB
MD5
1130206a3ade58affd23df0e53c6744b
SHA1
0552e4cb6e3366ecc789cd3be12856483e1e6a06
SHA256
bd257601a2e601e8dd72158039b8b9e57d2bb6faba8f7953b80547c0ace22447
SHA512
d8ddb292b0aaeb7eb41dcacfbfc21f242547a210e11a4a8d55fd524da5e0cee145852621899e39112f9aca77abd4ad9c4cc1ec21a63a518edce48f1a35599a7f
SSDEEP
196608:7zLxaue6NGEALx5EWgKQ81BPTmrzGQgazHAp5Ht8Fmxe3FK+B9J2ZAICnB:ftautyLnFxQ1zHOt7e3fo0B
Checks for missing Authenticode signature.
resource |
---|
unpack001/IDM_6.4x_Crack_v19.7.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_wsplitpath
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
free
calloc
memcpy
_except_handler3
memchr
memcmp
_itoa
strlen
??2@YAPAXI@Z
??3@YAXPAX@Z
wcsstr
strstr
wcschr
wcslen
wcscat
memset
wcsncpy
__CxxFrameHandler
wcscpy
GetStartupInfoA
GetFileSize
CreateFileMappingA
GetFileTime
SetFileTime
MapViewOfFile
ExitThread
UnmapViewOfFile
FormatMessageA
CreateFileW
SetFilePointer
WriteFile
lstrlenA
LocalFree
GetCurrentProcess
WaitForSingleObject
GetExitCodeThread
GetModuleFileNameW
CreateProcessW
CloseHandle
CreateMutexA
ExitProcess
GetVersionExA
GetTempPathW
GetFileAttributesW
CreateDirectoryW
CreateThread
LoadLibraryA
FreeLibrary
GetDiskFreeSpaceW
GetProcAddress
GetModuleHandleA
GetLastError
SetForegroundWindow
ShowWindow
FindWindowA
wsprintfA
DestroyWindow
MessageBoxA
SetWindowTextA
SendMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfW
PostQuitMessage
CreateDialogParamA
RegDeleteValueW
RegQueryValueExW
RegOpenKeyExA
RegCloseKey
SHGetPathFromIDListW
SHBrowseForFolderW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ