Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
VKSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VKSetup.exe
Resource
win10v2004-20231215-en
Target
VKSetup.exe
Size
66.7MB
MD5
d106021048761a38c29490c902fb886a
SHA1
6303867437ababe917c9a5a3c06248eddb657291
SHA256
d26df7ab538548ef0ebc4f9872960725f9043c0810d53ce8c0b689e296dbe30e
SHA512
3251e9cdcaf04cf70c9ddbebe4993baddacd32ca5efe3ca162334d4de5dbd1c9ea8fb4eb9a05e1964aaa3ae43c4f16a948a96a8c3117f031ebaccbcaada2cade
SSDEEP
1572864:7IU28YwJQJEB/Ta9Zn7YyFImiFXic3+IAf+ykXMlKwMK+VB:774wJQJ0/Ta7hGd53Uf+ykXMlyRVB
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetFileAttributesW
GetFileTime
SetFileTime
QueryDosDeviceW
Process32FirstW
GetACP
GetExitCodeProcess
LocalFree
CloseHandle
GetCurrentProcessId
SizeofResource
VirtualProtect
SetEnvironmentVariableW
ReadProcessMemory
TerminateThread
FindNextFileW
FlushInstructionCache
GetFullPathNameW
GetThreadContext
VirtualFree
ExitProcess
HeapAlloc
GetLongPathNameW
SetUnhandledExceptionFilter
RtlUnwind
GetCPInfo
GetStdHandle
GetTimeZoneInformation
GetModuleHandleW
FreeLibrary
SetDllDirectoryW
ReadFile
GetModuleFileNameW
GetLastError
SetLastError
GetNativeSystemInfo
GlobalAlloc
GlobalUnlock
FindResourceW
CompareStringW
CreateThread
CheckRemoteDebuggerPresent
MapViewOfFile
CreateMutexW
LoadLibraryA
ResetEvent
GetVolumeInformationW
CreateFileA
FreeResource
GetDriveTypeW
GetVersion
Module32NextW
RaiseException
MoveFileW
GetSystemTimeAsFileTime
FormatMessageW
OpenProcess
SwitchToThread
GetExitCodeThread
GetEnvironmentVariableA
OutputDebugStringW
GetCurrentThread
GetLogicalDrives
HeapReAlloc
IsBadReadPtr
GlobalMemoryStatusEx
IsProcessorFeaturePresent
ExpandEnvironmentStringsW
LoadLibraryExW
TerminateProcess
LockResource
FileTimeToSystemTime
GetShortPathNameW
GetCurrentThreadId
UnhandledExceptionFilter
MoveFileExW
VirtualQuery
VirtualQueryEx
GlobalFree
Sleep
HeapWalk
EnterCriticalSection
GetDiskFreeSpaceExW
SetFilePointer
ReleaseMutex
LoadResource
GetTickCount
EnumResourceLanguagesW
GetFileSize
GetStartupInfoW
GetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
InitializeCriticalSection
GetCurrentProcess
SetThreadPriority
GlobalLock
VirtualAlloc
HeapSetInformation
GetTempPathW
GetSystemInfo
GetCommandLineW
LeaveCriticalSection
GetProcAddress
FindResourceExW
GetLogicalDriveStringsW
GetVersionExW
VerifyVersionInfoW
HeapCreate
GetEnvironmentStringsW
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
UnmapViewOfFile
GetModuleFileNameA
Process32NextW
lstrlenW
CompareStringA
SetEndOfFile
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
CreateToolhelp32Snapshot
LoadLibraryW
FreeEnvironmentStringsW
SetEvent
CreateFileW
GetLocaleInfoW
SystemTimeToFileTime
GetSystemDirectoryW
DeleteFileW
GetEnvironmentVariableW
GetLocalTime
WaitForSingleObject
Module32FirstW
WriteFile
FindFirstFileExW
CreateFileMappingW
ExitThread
OpenThread
DeleteCriticalSection
HeapLock
GetDateFormatW
TlsGetValue
HeapUnlock
SetErrorMode
TzSpecificLocalTimeToSystemTime
IsValidLocale
TlsSetValue
CreateDirectoryW
GetSystemDefaultUILanguage
IsWow64Process
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
CreateEventW
WaitForMultipleObjectsEx
GetVolumePathNameW
GetThreadLocale
SetThreadLocale
SHGetFolderPathA
DragFinish
SHGetFolderPathW
SHGetFileInfoW
DragQueryFileW
DragAcceptFiles
SHAppBarMessage
ShellExecuteExW
GetModuleInformation
GetProcessImageFileNameW
GetProcessMemoryInfo
EnumProcessModules
GetModuleFileNameExW
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
CoSetProxyBlanket
CoInitializeEx
CoInitialize
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoTaskMemFree
MoveWindow
CreateWindowExW
GetParent
PeekMessageW
MonitorFromWindow
SetTimer
MessageBoxA
MessageBoxW
AllowSetForegroundWindow
WindowFromPoint
BeginPaint
AttachThreadInput
MsgWaitForMultipleObjects
DestroyIcon
EmptyClipboard
IsWindowVisible
RegisterWindowMessageW
DispatchMessageW
UnregisterClassW
SendMessageW
IsWindow
GetClassInfoW
EnumThreadWindows
InvalidateRect
GetActiveWindow
SetActiveWindow
EnumChildWindows
BringWindowToTop
ReleaseCapture
SetCursor
LoadStringW
LoadCursorW
GetCapture
SetCapture
SetWindowPos
GetCursorInfo
TranslateMessage
OpenClipboard
CharLowerBuffW
CallWindowProcW
CloseClipboard
GetSystemMetrics
SetWindowLongW
UpdateLayeredWindow
CharUpperBuffW
GetClientRect
LoadImageW
ShowCursor
GetClipboardData
GetCursorPos
SetClipboardData
IsIconic
GetKeyState
GetMonitorInfoW
ShowWindow
MonitorFromPoint
CharUpperW
CreateIconFromResourceEx
SystemParametersInfoW
DefWindowProcW
GetWindowLongW
GetWindowRect
GetAsyncKeyState
SetForegroundWindow
GetForegroundWindow
KillTimer
EnableWindow
IsWindowEnabled
DestroyWindow
RegisterClassW
CharNextW
GetWindowThreadProcessId
RedrawWindow
GetFocus
GetDC
SetFocus
CreateIconIndirect
EndPaint
ReleaseDC
FindWindowW
TrackMouseEvent
SafeArrayPutElement
SysFreeString
VariantClear
VariantInit
SysReAllocStringLen
SysAllocString
SafeArrayCreate
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayCreateVector
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
VariantChangeType
RegSetValueExW
CloseServiceHandle
OpenServiceW
QueryServiceConfigW
OpenSCManagerW
RegOpenKeyExW
RegDeleteValueW
RegFlushKey
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
EnumServicesStatusW
CreateCompatibleBitmap
DeleteObject
SelectObject
DeleteDC
BitBlt
CreateDIBSection
SetMapMode
CreateCompatibleDC
GetDeviceCaps
NtQueryInformationProcess
NtQueryInformationThread
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ