Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
setupprep.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setupprep.exe
Resource
win10v2004-20230221-en
Target
setupprep.exe
Size
10.3MB
MD5
4ac5fbbbbb5c721a2e2030a9f52f38b1
SHA1
2bab866910306b4970c3c1089bdb78d4f48695e2
SHA256
8e68b7be4a97bff54c2a66c4a4a97699bd66b039a89f56aa69c49017d571829d
SHA512
16514f78a22eb39d0a588a6e4580f593dffdfb5d94e123fd8be03416884046d5e761afb11483791fe6f0d78c9b51120cb96b3fdce012e21de8ecf5efcf9e3895
SSDEEP
24576:+mmOplmohXGbo3owTcsJl3z0VdwmTRjPn5:+mLPVhX4o3hTzlC5
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
GetTokenInformation
RegQueryValueExW
OpenThreadToken
AddAccessAllowedAce
DuplicateTokenEx
GetLengthSid
RegDeleteValueW
SetSecurityInfo
CreateProcessAsUserW
RegOpenKeyExW
InitializeAcl
InitializeSecurityDescriptor
CheckTokenMembership
RegUnLoadKeyW
FreeSid
OpenProcessToken
RegSetValueExW
RegSetKeySecurity
RegEnumKeyExW
CopySid
RegCreateKeyExW
RegFlushKey
AllocateAndInitializeSid
RegDeleteKeyW
SetTokenInformation
GetAce
RegQueryInfoKeyW
RegEnumKeyW
RegCloseKey
RegNotifyChangeKeyValue
SetSecurityDescriptorDacl
GetTraceEnableFlags
GetTraceEnableLevel
RegisterTraceGuidsW
UnregisterTraceGuids
QueryAllTracesW
StopTraceW
GetTraceLoggerHandle
InitiateSystemShutdownExW
RegEnumValueW
AdjustTokenPrivileges
CloseHandle
GetNativeSystemInfo
LoadLibraryW
FindResourceExW
ResetEvent
LoadResource
GetOverlappedResult
SetFilePointerEx
LocalFree
MoveFileExW
LockFileEx
DeleteCriticalSection
GetCurrentProcessId
CreateProcessW
GetModuleHandleW
FreeLibrary
CopyFileW
WideCharToMultiByte
SystemTimeToTzSpecificLocalTime
GetSystemTime
DosDateTimeToFileTime
GetSystemWindowsDirectoryW
MoveFileW
GetDriveTypeW
LoadLibraryExW
FlushFileBuffers
GetExitCodeProcess
RaiseException
LockResource
GetVersionExA
GetCurrentThread
VerifyVersionInfoW
IsValidLocale
VerSetConditionMask
IsValidCodePage
MapViewOfFile
CreateFileMappingW
UnmapViewOfFile
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
GetFileSize
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
SetEvent
CreateFileA
GetLastError
GetTickCount64
LocalFileTimeToFileTime
DeleteFileW
GetTimeZoneInformation
Sleep
MultiByteToWideChar
CreateEventW
GetLogicalDriveStringsW
SetFileAttributesW
GetSystemDirectoryW
OpenEventW
GetFileAttributesW
CreateFileW
WaitForSingleObject
FindClose
CreateHardLinkW
CreateMutexW
UnlockFileEx
GetVersionExW
SetThreadPreferredUILanguages
GetLocaleInfoW
GetPrivateProfileIntW
InitializeCriticalSection
GlobalUnlock
GlobalLock
MulDiv
FindResourceW
SizeofResource
DuplicateHandle
GetShortPathNameW
HeapSize
HeapReAlloc
IsDebuggerPresent
VirtualQuery
GetPriorityClass
GetThreadPriority
OutputDebugStringW
GetExitCodeThread
SetEndOfFile
SetThreadPriority
SetPriorityClass
CreateThread
FormatMessageW
GetPrivateProfileSectionW
GetFileTime
FileTimeToSystemTime
CompareFileTime
SetCurrentDirectoryW
GetCurrentDirectoryW
CopyFileExW
GetFileInformationByHandle
DeviceIoControl
SetLastError
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
SetFilePointer
HeapFree
GetModuleHandleExW
HeapAlloc
GetProcAddress
GetProcessHeap
CreateDirectoryW
ReadFile
FindFirstFileW
GetFileSizeEx
CompareStringW
EnterCriticalSection
GetCommandLineW
GetFullPathNameW
FindNextFileW
GetCurrentProcess
WriteFile
ExpandEnvironmentStringsW
TerminateProcess
SetFileTime
GetModuleFileNameW
WaitForMultipleObjects
SetEnvironmentVariableW
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
EnableMenuItem
SystemParametersInfoW
GetKeyState
GetFocus
IsChild
GetNextDlgTabItem
GetWindowLongW
RedrawWindow
CopyRect
DrawFocusRect
PostMessageW
GetDC
GetSysColor
GetClientRect
GetParent
InvalidateRect
LoadStringW
GetSystemMenu
GetSysColorBrush
GetSystemMetrics
IsWindowVisible
FillRect
GetWindowLongA
AdjustWindowRectEx
SetCursor
LoadCursorW
EnableWindow
TrackMouseEvent
LoadImageW
KillTimer
SetWindowLongW
DrawTextW
CharUpperW
GetWindowRect
MessageBoxW
SendMessageW
SetTimer
PostThreadMessageW
ord4130
ord1966
ord2661
ord6351
ord5467
ord2408
ord1405
ord3783
ord2412
ord1066
ord3468
ord5722
ord5725
ord4368
ord629
ord1043
ord5066
ord5730
ord5711
ord3754
ord6054
ord4215
ord663
ord286
ord3535
ord6440
ord4623
ord4609
ord1646
ord336
ord6559
ord851
ord6127
ord525
ord984
ord3742
ord599
ord4481
ord6734
ord4826
ord1586
ord287
ord812
ord288
ord1082
ord3790
ord2427
ord1574
ord4770
ord4983
ord4371
ord3164
ord4077
ord4083
ord4082
ord3046
ord3166
ord3052
ord3366
ord3231
ord4815
ord3362
ord3243
ord3049
ord1505
ord1949
ord1479
ord4550
ord1463
ord3894
ord1035
ord2329
ord822
ord1430
ord3830
ord626
ord1126
ord2856
ord1040
ord5077
ord5406
ord5245
ord4771
ord1777
ord6437
ord5687
ord665
ord5699
ord2140
ord2457
ord5683
ord1736
ord6614
ord6612
ord6102
ord6632
ord5484
ord3933
ord6814
ord2060
ord2670
ord4789
ord5229
ord4017
ord5712
ord4694
ord6812
ord5586
ord2399
ord5663
ord4752
ord1067
ord1778
ord4365
ord4988
ord2903
ord2665
ord4557
ord1441
ord1812
ord337
ord2094
ord2193
ord4218
ord2517
ord4721
ord852
ord5702
ord3076
ord3177
ord342
ord6352
ord3286
ord4445
ord854
ord1799
ord2586
ord4741
ord4187
ord4424
ord2900
ord1647
ord2393
ord4131
ord2906
ord4014
ord6705
ord6708
ord4612
ord6243
ord2420
ord2898
ord1930
ord4599
ord3174
__CxxFrameHandler3
__wgetmainargs
wcsncmp
iswspace
bsearch
_amsg_exit
_XcptFilter
wcsstr
exit
_exit
_cexit
_wtoi
towlower
_wcstoui64
wcstoul
towupper
_vscwprintf
wcsrchr
_wcsnicmp
_wcsicmp
__set_app_type
wcschr
_purecall
__setusermatherr
memcpy_s
__RTDynamicCast
memcmp
memcpy
memmove
_initterm
__C_specific_handler
memset
??1type_info@@UEAA@XZ
?terminate@@YAXXZ
_onexit
_vsnwprintf
__dllonexit
_unlock
_lock
_commode
_fmode
_wcmdln
wcscmp
InitCommonControlsEx
CoUninitialize
CoCreateInstance
CoInitializeEx
ShellExecuteW
CommandLineToArgvW
RtlFreeHeap
NtShutdownSystem
RtlNtStatusToDosError
NtSetInformationFile
RtlAllocateHeap
NtSetInformationThread
NtDuplicateToken
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlDeleteCriticalSection
RtlInitializeCriticalSection
RtlCaptureContext
RtlGetVersion
RtlAdjustPrivilege
RtlRaiseStatus
RtlReAllocateHeap
NtYieldExecution
NtSetInformationProcess
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSQueryUserToken
WIMUnmountImage
WIMSetFileIOCallbackTemporaryPath
WIMInitFileIOCallbacks
WdsSetupLogMessageW
CurrentIP
ConstructPartialMsgVW
I_RpcMapWin32Status
RpcStringFreeW
UuidFromStringW
UuidToStringW
DeleteDC
CreateICW
CreateSolidBrush
CreateFontIndirectW
SetTextColor
StretchBlt
CreateCompatibleDC
BitBlt
SetBrushOrgEx
SetBkMode
GetStockObject
GetDeviceCaps
CreateDIBSection
GetObjectW
DeleteObject
TranslateCharsetInfo
CreateDCW
EnumFontFamiliesExW
ord23
ord20
ord22
SysFreeString
SysAllocString
VerQueryValueW
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
BCryptDestroyHash
BCryptFinishHash
BCryptOpenAlgorithmProvider
BCryptCloseAlgorithmProvider
BCryptHashData
BCryptCreateHash
IsAppThemed
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ