Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
install-win64-11.5.8_en-US.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
install-win64-11.5.8_en-US.exe
Resource
win10v2004-20221111-en
Target
install-win64-11.5.8_en-US.exe
Size
273.0MB
MD5
add113bc2bbad70f5f723ee596daf08a
SHA1
217788032aef96931407a5ed45dca3f192af39e6
SHA256
3ac3e1df560c2aa119f47291d8fc0386cdc99a3dc72384e8ee3a461c20e7b6ac
SHA512
76d5544b9f344ce01a0be18f1de3e3b326948a0551556b46a311a8267cb646b89c1c0dc11380c4dd6d9ac82a643271e892c86754a724ab68ca566040618f9b26
SSDEEP
24576:fQT0O80vPi9h3rz19gqr2A3UOOJzI1Cga:I69hl9g3tOOJzIIV
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
CoTaskMemFree
CoUninitialize
CoInitializeSecurity
NtQuerySystemInformation
RtlCaptureContext
RtlUnwind
BCryptOpenAlgorithmProvider
BCryptGenRandom
BCryptCloseAlgorithmProvider
LookupAccountSidW
GetTokenInformation
OpenProcessToken
GetNamedSecurityInfoW
SystemFunction036
AccessCheck
MapGenericMask
RevertToSelf
OpenThreadToken
ImpersonateSelf
GetSidIdentifierAuthority
IsValidSid
GetIfEntry2
FreeMibTable
GetIfTable2
GetFileType
GetStringTypeW
CompareStringW
LCMapStringW
HeapSize
GetConsoleOutputCP
CloseHandle
GetSystemTimeAsFileTime
QueryPerformanceCounter
WaitForSingleObject
GetExitCodeProcess
GetProcessHeap
HeapFree
GetLastError
HeapAlloc
OpenProcess
GetProcessTimes
GetSystemTimes
GetProcessIoCounters
GetCurrentProcessId
GetTickCount64
GlobalMemoryStatusEx
GetLogicalDrives
GetDiskFreeSpaceExW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
CreateFileW
GetDriveTypeW
GetVolumeInformationW
DeviceIoControl
GetSystemInfo
SleepConditionVariableSRW
TlsGetValue
TlsSetValue
TryAcquireSRWLockExclusive
LocalFree
GetCurrentThread
lstrlenW
FreeEnvironmentStringsW
ReleaseMutex
FindClose
ReleaseSRWLockShared
CompareStringOrdinal
AddVectoredExceptionHandler
SetThreadStackGuarantee
SwitchToThread
GetCurrentProcess
GetProcAddress
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCommandLineW
FlushFileBuffers
DuplicateHandle
SetFilePointerEx
CreateDirectoryW
GetStdHandle
WriteFileEx
SleepEx
ReadFileEx
TerminateProcess
WaitForMultipleObjects
GetOverlappedResult
WakeAllConditionVariable
WakeConditionVariable
TlsAlloc
HeapReAlloc
AcquireSRWLockShared
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetModuleHandleA
FindNextFileW
GetFileInformationByHandle
GetFileInformationByHandleEx
FindFirstFileW
DeleteFileW
DecodePointer
GetFinalPathNameByHandleW
CreateEventW
ReadFile
CancelIo
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
ExitProcess
GetFullPathNameW
CreateNamedPipeW
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
CreateThread
GetTempPathW
GetConsoleMode
WriteConsoleW
SetStdHandle
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
WriteFile
LoadLibraryExW
FreeLibrary
TlsFree
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
RaiseException
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetCurrentThreadId
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
NetApiBufferFree
NetUserEnum
NetUserGetLocalGroups
SysFreeString
VariantClear
SysAllocString
PdhCollectQueryData
PdhCloseQuery
PdhRemoveCounter
PdhOpenQueryA
PdhGetFormattedCounterValue
PdhAddEnglishCounterW
CallNtPowerInformation
GetPerformanceInfo
GetModuleFileNameExW
LsaGetLogonSessionData
LsaFreeReturnBuffer
LsaEnumerateLogonSessions
SHGetKnownFolderPath
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ