Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
Setup.x86.en-US_ProPlusRetail_NQTF8-C889H-6HQ37-CC9RK-BKJQD_TX_PR_act_1_.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Setup.x86.en-US_ProPlusRetail_NQTF8-C889H-6HQ37-CC9RK-BKJQD_TX_PR_act_1_.exe
Resource
win10v2004-20240412-en
Target
Setup.x86.en-US_ProPlusRetail_NQTF8-C889H-6HQ37-CC9RK-BKJQD_TX_PR_act_1_.exe
Size
958KB
MD5
0f08f2b24d868d78196eb2f8860ad985
SHA1
66ddbffb1d22e95fab84bf0899751224deb2c760
SHA256
beb093cf3b9ffea445972b1c80a8c7e9e98407657ad89308dfcd2b6c3ed6764e
SHA512
749a80373db7a1a650c8b1f1fc741ca7528408380637444dd059c40761ed1c8bc41f97218c67d81ecd0b240e60309616bdc080ca4a40a4aa698135397e9ce6c8
SSDEEP
24576:AnQ3YYmrALiJ1UZrYcjE/SBeD5rrFH39+ihi:AnQ3Ydc9GcoXNrNhi
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
P:\Target\x86\ship\click2run\en-us\bootstrapper.pdb
RegCloseKey
RegCreateKeyExW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
CloseServiceHandle
CredWriteW
CreateProcessAsUserW
RegDeleteTreeW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
RegGetValueW
GetTokenInformation
OpenProcessToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
LookupAccountNameW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RevertToSelf
EventWrite
EventUnregister
EventRegister
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
DeleteFileW
CloseHandle
GetLocalTime
GetComputerNameW
WriteFile
GetCurrentProcessId
SetEvent
CreateEventExW
GetTickCount64
WaitForMultipleObjects
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
SetLastError
CreateDirectoryW
FindClose
FindFirstFileExW
GetFileAttributesExW
SetFileAttributesW
SetFilePointerEx
GetTickCount
FormatMessageW
WideCharToMultiByte
CreateEventW
IsProcessorFeaturePresent
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
WaitForSingleObject
TerminateProcess
GetCurrentThread
GetThreadIOPendingFlag
TryEnterCriticalSection
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
QueryDepthSList
SetWaitableTimerEx
CancelWaitableTimer
CreateWaitableTimerW
ReleaseMutex
WaitForMultipleObjectsEx
CreateMutexA
CreateEventA
OpenProcess
MapViewOfFile
UnmapViewOfFile
CreateSemaphoreA
CreateFileMappingA
QueryFullProcessImageNameW
TlsSetValue
WerUnregisterMemoryBlock
CreateThread
GetProcessAffinityMask
ResetEvent
MulDiv
WaitForSingleObjectEx
CreateMemoryResourceNotification
FreeLibrary
LoadLibraryExW
IsSystemResumeAutomatic
GetSystemPowerStatus
ReleaseSemaphore
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
Sleep
RaiseException
TlsGetValue
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
HeapReAlloc
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
InterlockedIncrement
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
HeapSize
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InterlockedExchange
LoadLibraryW
SetFilePointer
GetConsoleCP
GetConsoleMode
LCMapStringW
SetStdHandle
WriteConsoleW
CreateFileW
FlushFileBuffers
GetVersionExW
GetUserGeoID
GetSystemDefaultLCID
ExpandEnvironmentStringsW
LocaleNameToLCID
GetDriveTypeW
GetLogicalDriveStringsW
QueryDosDeviceW
CreateMutexW
FreeConsole
AttachConsole
AllocConsole
K32GetProcessImageFileNameW
LocalFree
GetShortPathNameW
LoadResource
LockResource
SizeofResource
FindResourceW
GetLocaleInfoEx
GetFileAttributesW
OutputDebugStringA
OpenThread
GetExitCodeThread
GetVersion
GetModuleHandleA
LoadLibraryA
MoveFileExW
LocalAlloc
GetTempPathW
GetStringTypeExW
GetOverlappedResult
DecodePointer
TlsFree
lstrcmpW
RemoveDirectoryW
FindNextFileW
FindFirstFileW
TlsAlloc
GetProcessHeap
GetTempPathA
DeleteFileA
LCIDToLocaleName
GetLongPathNameW
GetShortPathNameA
GetModuleFileNameA
RtlUnwind
SetEndOfFile
SetUnhandledExceptionFilter
MultiByteToWideChar
RaiseFailFastException
GetModuleFileNameW
CompareStringEx
IsWow64Process
GetCurrentProcess
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
WerRegisterMemoryBlock
VerSetConditionMask
GetDiskFreeSpaceExW
GetNativeSystemInfo
VerifyVersionInfoW
ProcessIdToSessionId
GetTempFileNameW
ReadFile
CopyFileW
GetFullPathNameW
GetExitCodeProcess
CreateProcessW
GetPriorityClass
K32EnumProcesses
K32GetModuleFileNameExW
GetCurrentDirectoryW
GlobalFree
StringFromIID
CoTaskMemFree
StringFromGUID2
CoCreateGuid
CoCreateInstance
CoRevokeInitializeSpy
CreateStreamOnHGlobal
CoInitializeEx
CoUninitialize
CoRegisterInitializeSpy
GetAddrInfoW
WSAStartup
FreeAddrInfoW
CreateFontW
CreateSolidBrush
DeleteObject
GetDeviceCaps
GetStockObject
Rectangle
SelectObject
SetDCPenColor
GetTextMetricsW
GetTextExtentPoint32W
SetBkColor
SetDCBrushColor
SetTextColor
CreatePen
GdipDeleteBrush
GdipDrawImageRectI
GdipFillRectangleI
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateBitmapFromScan0
GdipAlloc
GdipGetImageWidth
GdipGetImageHeight
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdipLoadImageFromStream
GdipCreateSolidFill
GdipCloneBrush
GdiplusStartup
GdipFree
RpcBindingFromStringBindingW
RpcMgmtIsServerListening
RpcStringBindingComposeW
RpcStringFreeW
RpcBindingSetAuthInfoW
RpcBindingFree
FreeMibTable
CreateSortedAddressPairs
SysAllocString
VariantInit
VariantClear
SysFreeString
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
WinVerifyTrust
ord13
ord10
ord14
SetupIterateCabinetW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ