Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20220812-en
Target
setup.exe
Size
100.9MB
MD5
3d79df86329c7c624c044a834caaa5c3
SHA1
8bd7ce60144a43e3772fbbd95a88b2a926c4bc43
SHA256
48607e4b512f99702eaf170c4ea7bc5819f9ddf9821d3fe8717a6790f843c2dc
SHA512
2faeca4e6b25f31671f1a9533813bdbcba15723ba40fa96f41ba8386082a393cbdd62587c777623ea5b34427d0548ae5497135aef34935d4a9b17e95b693600a
SSDEEP
1572864:UGtA1dAibANyXxKARMOtcNCn0qAQFiakfCL8mnxMTJdXXmrwzo3E/2OT5CkR:gdAaANIKARMRMnpFia2i34ghIB
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
CN=Solera Holdings\, INC.,OU=RTS,O=Solera Holdings\, INC.,L=Westlake,ST=Texas,C=US
CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=US
CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US
CN=Solera Holdings\, INC.,OU=RTS,O=Solera Holdings\, INC.,L=Westlake,ST=Texas,C=US
CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=US
CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord17
GetSystemTimeAsFileTime
GetPrivateProfileStringW
MoveFileW
LocalFree
FormatMessageW
GetSystemInfo
MulDiv
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadLibraryExW
GetVersion
GetLocalTime
GetFileAttributesW
GetCurrentDirectoryW
FileTimeToLocalFileTime
GetFileTime
GetSystemDefaultUILanguage
FlushFileBuffers
SetEndOfFile
VirtualQuery
IsBadReadPtr
GetDiskFreeSpaceExW
GetDriveTypeW
GetCurrentThread
InterlockedExchange
LoadLibraryExA
GetPrivateProfileSectionW
GetShortPathNameW
GetModuleHandleW
GetProcAddress
GetSystemDirectoryA
LoadLibraryA
GetLastError
SetLastError
SetFileAttributesW
GetFileSize
CloseHandle
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
ReadFile
SetFilePointer
WriteFile
HeapAlloc
FindNextFileW
FindFirstFileW
FindClose
CreateDirectoryW
CompareFileTime
VerLanguageNameW
GetUserDefaultLangID
GetSystemDefaultLangID
lstrcmpiW
lstrcmpW
IsValidLocale
GetLocaleInfoW
lstrcpyA
ExitThread
GetExitCodeProcess
GetCommandLineW
LoadLibraryW
FreeLibrary
CompareStringA
CompareStringW
FreeResource
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcatA
lstrcmpiA
lstrcpynA
LocalAlloc
lstrcmpA
SystemTimeToFileTime
ResetEvent
SetEvent
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
FindResourceExW
GetEnvironmentVariableW
SetFileTime
OpenProcess
GetProcessTimes
ReadConsoleW
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
lstrcatW
GetVersionExW
InterlockedDecrement
InterlockedIncrement
CreateEventW
QueryPerformanceFrequency
GetTempFileNameW
CopyFileW
GetTickCount
GetExitCodeThread
CreateThread
FindResourceW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
SizeofResource
LockResource
LoadResource
lstrcpyW
GetWindowsDirectoryW
SetErrorMode
GetTempPathW
CreateFileW
ExpandEnvironmentStringsW
MoveFileExW
WriteProcessMemory
VirtualProtectEx
GetSystemDirectoryW
FlushInstructionCache
SetThreadContext
GetThreadContext
CreateProcessW
ResumeThread
TerminateProcess
ExitProcess
GetCurrentProcess
Sleep
WaitForSingleObject
DuplicateHandle
RemoveDirectoryW
DeleteFileW
SetCurrentDirectoryW
lstrlenW
lstrcpynW
GetModuleFileNameW
GetProcessHeap
HeapFree
FatalAppExitA
WritePrivateProfileSectionW
EnumSystemLocalesW
GetUserDefaultLCID
GetTimeFormatW
GetDateFormatW
SetConsoleCtrlHandler
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
HeapReAlloc
CreateSemaphoreW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetCurrentThreadId
HeapSize
AreFileApisANSI
GetModuleHandleExW
GetStdHandle
IsProcessorFeaturePresent
IsDebuggerPresent
RtlUnwind
LCMapStringW
DecodePointer
EncodePointer
MapWindowPoints
GetMessageW
TranslateMessage
DispatchMessageW
PostMessageW
DefWindowProcW
PostQuitMessage
RegisterClassW
CreateWindowExW
SetTimer
KillTimer
LoadCursorW
LoadIconW
wsprintfW
PeekMessageW
MsgWaitForMultipleObjects
GetDesktopWindow
ShowWindow
DialogBoxIndirectParamW
EndDialog
GetDlgItem
SetWindowTextW
CharPrevW
wvsprintfW
LoadImageW
CreateDialogParamW
MoveWindow
GetParent
GetWindowTextW
SetCursor
GetWindow
GetDlgItemTextW
SetFocus
SetForegroundWindow
SetActiveWindow
SetDlgItemTextW
FindWindowW
SubtractRect
IntersectRect
SetRect
FillRect
SetWindowPos
GetSysColor
GetDC
GetSystemMetrics
GetDlgCtrlID
CreateDialogIndirectParamW
ExitWindowsEx
CharUpperW
wsprintfA
CallWindowProcW
DrawIcon
DrawTextW
UpdateWindow
InvalidateRect
SetPropW
GetPropW
RemovePropW
GetSysColorBrush
DrawFocusRect
CopyRect
InflateRect
EnumChildWindows
GetClassNameW
MapDialogRect
RegisterClassExW
MonitorFromPoint
CharNextW
IsDialogMessageW
FindWindowExW
ScreenToClient
MessageBoxW
GetWindowRect
EnableWindow
SendDlgItemMessageW
DestroyWindow
IsWindow
SendMessageW
WaitForInputIdle
SetWindowLongW
GetWindowLongW
GetClientRect
EndPaint
BeginPaint
ReleaseDC
GetWindowDC
CreateHalftonePalette
GetDIBColorTable
SelectPalette
RealizePalette
GetSystemPaletteEntries
CreatePalette
CreateFontW
SetTextColor
SetBkMode
GetDeviceCaps
CreateSolidBrush
GetObjectW
TranslateCharsetInfo
CreateFontIndirectW
SetStretchBltMode
StretchBlt
SelectObject
DeleteDC
CreateDIBitmap
CreateCompatibleDC
BitBlt
DeleteObject
GetStockObject
CreateCompatibleBitmap
CreateDCW
CreatePatternBrush
GetTextExtentPoint32W
RestoreDC
SaveDC
DeleteMetaFile
CreateBitmap
CreateRectRgn
PatBlt
PlayMetaFile
SelectClipRgn
SetBkColor
SetMapMode
SetMetaFileBitsEx
SetPixel
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
UnrealizeObject
RegQueryValueExW
RegOpenKeyExW
CryptVerifySignatureW
CryptSignHashW
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptImportKey
CryptExportKey
CryptGetHashParam
CryptSetHashParam
CryptDestroyKey
CryptDeriveKey
CryptReleaseContext
CryptAcquireContextW
RegOpenKeyW
RegEnumKeyW
RegCreateKeyW
RegOverridePredefKey
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
OpenThreadToken
OpenProcessToken
SetEntriesInAclW
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CreateWellKnownSid
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
RegEnumValueW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
CommandLineToArgvW
ShellExecuteW
SHBrowseForFolderW
SHGetFolderPathW
SHGetPathFromIDListW
ShellExecuteExW
SHGetMalloc
SHGetSpecialFolderLocation
CoUninitialize
CoInitializeSecurity
CoInitialize
CoTaskMemRealloc
ProgIDFromCLSID
CreateStreamOnHGlobal
CoTaskMemAlloc
CLSIDFromProgID
GetRunningObjectTable
CreateItemMoniker
CoCreateGuid
StringFromGUID2
CoCreateInstance
CoTaskMemFree
SysReAllocStringLen
VarUI4FromStr
SystemTimeToVariantTime
VarBstrCmp
CreateErrorInfo
SetErrorInfo
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VarBstrCat
VarBstrFromDate
VariantClear
VariantChangeType
SysAllocStringLen
SysFreeString
GetErrorInfo
UuidToStringW
UuidFromStringW
RpcStringFreeW
UuidCreate
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromResource
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetInterpolationMode
GdipDrawImageRectI
GdipGetImageWidth
GdipGetImageHeight
GdipAlloc
GdipFree
GdiplusStartup
GdipCloneImage
GdipDisposeImage
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ