Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
systeminformer-3.0.7459-setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
systeminformer-3.0.7459-setup.exe
Resource
win10v2004-20240221-en
Target
systeminformer-3.0.7459-setup.exe
Size
14.9MB
MD5
0237876fabb039a0a51d9f9718219456
SHA1
9ba8541650bb188c130e5ffead5b5488a002aac5
SHA256
29cdebed8098f5bc9c55960842af55cece35a9445e7236965504d5bfb8456b86
SHA512
c8e1c5064e57a8d88eb421d5db3646dc24a86a643df06d4e8ff529797918ee260efa62247e11fb4faf8410fb6092b53218109b98ee6fbf358e05cab6be2a8923
SSDEEP
393216:g94vlKzNPog6w/iSWNxVOd7wvZrzycbEU5ecCsFsD:I4cplypschrzyzWeRUY
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CustomSetupTool.pdb
NtCreateKey
RtlCreateSecurityDescriptor
NtCreateFile
NtQueryDirectoryFile
NtSetValueKey
RtlQueryEnvironmentVariable
NtWaitForSingleObject
RtlNtStatusToDosErrorNoTeb
NtCreateDirectoryObject
RtlRandomEx
RtlGetFullPathName_UEx
NtDelayExecution
RtlAddAccessAllowedAce
RtlFindMessage
RtlQueryPerformanceCounter
RtlCreateAcl
NtQueryDefaultLocale
RtlExpandEnvironmentStrings_U
LdrFindResource_U
RtlEnterCriticalSection
RtlLeaveCriticalSection
LdrAccessResource
NtCreateEvent
NtSetEvent
NtReleaseKeyedEvent
NtWaitForKeyedEvent
NtCreateKeyedEvent
RtlUnwind
NtQueryDirectoryObject
NtQueryAttributesFile
NtDeleteValueKey
NtQueryInformationToken
NtSetInformationFile
NtOpenProcess
NtQuerySystemInformationEx
NtQuerySymbolicLinkObject
RtlConvertSidToUnicodeString
RtlDosPathNameToNtPathName_U_WithStatus
NtOpenKey
RtlSetDaclSecurityDescriptor
NtEnumerateValueKey
NtOpenSymbolicLinkObject
NtOpenProcessToken
RtlCreateHeap
RtlSetHeapInformation
RtlGetVersion
NtQueryInformationProcess
NtQuerySystemInformation
RtlInterlockedPopEntrySList
RtlUnicodeToUTF8N
RtlFreeHeap
RtlMultiByteToUnicodeSize
RtlMultiByteToUnicodeN
RtlUTF8ToUnicodeN
RtlReAllocateHeap
NtAllocateVirtualMemory
NtCreateThreadEx
RtlUpcaseUnicodeChar
RtlAllocateHeap
NtFreeVirtualMemory
RtlRaiseStatus
RtlInterlockedPushEntrySList
NtQueryMutant
NtQueryInformationFile
NtReadFile
NtWriteFile
NtDeleteKey
NtOpenMutant
NtTerminateProcess
NtClose
NtQueryValueKey
NtCreateMutant
DecodePointer
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
FindNextFileW
FindFirstFileExW
HeapSize
GetLastError
GetNativeSystemInfo
MoveFileExW
TlsSetValue
TlsAlloc
TlsGetValue
GetLocaleInfoW
MultiByteToWideChar
IsProcessorFeaturePresent
FormatMessageW
LocalFree
LoadLibraryExW
FreeLibrary
FindClose
WideCharToMultiByte
SetFilePointerEx
HeapReAlloc
FlushFileBuffers
GetTimeZoneInformation
SetStdHandle
LCMapStringW
CompareStringW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetOEMCP
GetACP
IsValidCodePage
GetStringTypeW
GetCPInfo
HeapAlloc
HeapFree
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
GetStdHandle
GetConsoleOutputCP
WriteFile
GetConsoleMode
CloseHandle
GetFileType
CreateFileW
TlsFree
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
SetLastError
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LoadLibraryExA
GetProcAddress
GetModuleHandleW
VirtualQuery
VirtualProtect
GetSystemInfo
RaiseException
WriteConsoleW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ