Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
927a4daee178815228161f2ca4e0041296bfc232c62b885a878bd764498b973e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
927a4daee178815228161f2ca4e0041296bfc232c62b885a878bd764498b973e.exe
Resource
win10v2004-20240426-en
Target
927a4daee178815228161f2ca4e0041296bfc232c62b885a878bd764498b973e
Size
3.4MB
MD5
2cee0bc1f9add8e5fed41e132810fe74
SHA1
f03e5ab36f73dd3208de0327fd2ef58e6548a78e
SHA256
927a4daee178815228161f2ca4e0041296bfc232c62b885a878bd764498b973e
SHA512
e5834e09861daeb7eab75f8a6f03e416085590433ef5bc19f0e4b5b514b45cd2db600eb47ff1d940c1cd8936b89413d220ebd82008e3b1def29839b0b49607c1
SSDEEP
98304:73K2se8nchv1Zcn20+16PpFVkVFk9WAH7hi:+2Mchv16n20S6Cnh2A
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\build\autobuild\ad647feb5fc3faa0\setupexe\m3_light\setupexe.pdb
ord137
ord169
ord88
ord70
ord190
ord141
ord175
ord17
GetTempPathW
GetLastError
GetProcAddress
LoadLibraryA
WTSGetActiveConsoleSessionId
DuplicateHandle
CloseHandle
GetVersion
LocalFree
GetCommandLineW
LoadLibraryW
CopyFileW
FormatMessageW
CompareStringW
MoveFileW
GetUserDefaultUILanguage
DeleteFileW
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
WriteFile
CreateFileW
MoveFileExW
CreateFileA
WaitForSingleObject
OpenProcess
SetFilePointer
CreateDirectoryW
GetTempFileNameW
LockResource
SizeofResource
LoadResource
FindResourceExA
HeapReAlloc
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
HeapFree
GetCurrentProcess
HeapAlloc
FreeLibrary
GetProcessHeap
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
GetSystemMetrics
EndDialog
MessageBoxExW
SetWindowTextW
EnableWindow
IsDlgButtonChecked
DialogBoxParamW
MessageBoxW
SetDlgItemTextA
LoadStringW
GetDlgItem
SetDlgItemTextW
RegQueryValueExW
RegCloseKey
ConvertSidToStringSidW
AdjustTokenPrivileges
GetLengthSid
RegOpenKeyExW
DuplicateTokenEx
LookupPrivilegeValueW
LookupAccountNameW
ConvertStringSidToSidW
EqualSid
CopySid
GetTokenInformation
OpenProcessToken
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteExW
StringFromGUID2
WTSQuerySessionInformationW
WTSEnumerateProcessesW
GetUserNameExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ