Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
setup_online_1.1.14.0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
setup_online_1.1.14.0.exe
Resource
win10v2004-20240426-en
Target
setup_online_1.1.14.0.exe
Size
5.2MB
MD5
4de69d4b29047a97b03b500371819e2b
SHA1
b1b96a7e26b6e927aedf8d938cc5c1ef9bb9b745
SHA256
41e19629f13f3608c3198eb20950a01237edf860ca0d864d99533554da67bc39
SHA512
b3f94f56e812ba582a9f2b9559434df10fa249a39a68572bd978519140648373ab5c9a25b213e4aa4be3cb846b693ece7804d523d951873a9ffc8562ba3f76f5
SSDEEP
98304:6FhSAQ7R5mD7VnEOs43zJjoIA3HYwUi/61n:6FgAP7VJHsIpVi
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
setup.exe.pdb
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
ConvertSidToStringSidW
CreateProcessAsUserW
DuplicateTokenEx
FreeSid
GetNamedSecurityInfoW
GetSecurityInfo
GetTokenInformation
GetUserNameW
ImpersonateLoggedOnUser
IsValidSid
LookupAccountNameW
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegLoadKeyW
RegOpenCurrentUser
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
RegUnLoadKeyW
RevertToSelf
SetEntriesInAclW
SetNamedSecurityInfoW
SetSecurityInfo
SystemFunction036
GetOpenFileNameW
BitBlt
CombineRgn
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectW
CreateRectRgn
CreateRectRgnIndirect
DeleteDC
DeleteObject
GdiAlphaBlend
GetCurrentObject
GetDIBits
GetDeviceCaps
GetLayout
GetObjectType
GetObjectW
GetRandomRgn
GetRgnBox
GetStockObject
GetTextExtentPoint32W
IntersectClipRect
LPtoDP
ModifyWorldTransform
OffsetRgn
RectVisible
RestoreDC
SaveDC
SelectClipRgn
SelectObject
SetBkMode
SetDIBColorTable
SetGraphicsMode
SetLayout
SetViewportOrgEx
SetWindowOrgEx
SetWorldTransform
StretchBlt
CreateDispTypeInfo
CreateStdDispatch
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
VarCmp
VarUI4FromStr
VariantChangeType
VariantClear
VariantCopy
VariantInit
PathAppendW
PathCombineW
PathFileExistsW
PathFindExtensionW
PathFindFileNameA
PathFindFileNameW
PathGetDriveNumberW
PathIsDirectoryW
PathMatchSpecW
PathRemoveFileSpecW
SHDeleteKeyW
SHDeleteValueW
SHGetValueA
SHGetValueW
SHSetValueW
StrCpyW
StrStrIW
AdjustWindowRectEx
AllowSetForegroundWindow
AttachThreadInput
BeginPaint
BringWindowToTop
CallWindowProcW
CharNextW
CharUpperW
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageW
DrawIconEx
DrawTextW
EndPaint
FillRect
FindWindowExW
FindWindowW
GetActiveWindow
GetAsyncKeyState
GetCapture
GetClassInfoExW
GetClassNameW
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetFocus
GetForegroundWindow
GetIconInfo
GetKeyState
GetMessageExtraInfo
GetMessagePos
GetMessageW
GetMonitorInfoW
GetParent
GetShellWindow
GetSystemMetrics
GetWindow
GetWindowLongW
GetWindowRect
GetWindowTextW
GetWindowThreadProcessId
InflateRect
IntersectRect
InvalidateRect
InvalidateRgn
IsIconic
IsWindow
IsWindowVisible
KillTimer
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MapWindowPoints
MessageBoxW
MonitorFromWindow
MoveWindow
PostMessageW
PostQuitMessage
PtInRect
RegisterClassExW
RegisterClassW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageTimeoutW
SendMessageW
SetActiveWindow
SetCapture
SetCursor
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetTimer
SetWindowLongW
SetWindowPos
SetWindowTextW
SetWindowsHookExW
ShowWindow
SystemParametersInfoW
TrackMouseEvent
TranslateMessage
UnhookWindowsHookEx
UnregisterClassW
UpdateLayeredWindow
UpdateWindow
WindowFromDC
wsprintfW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
timeGetTime
EnumProcesses
GetModuleFileNameExW
GetModuleInformation
GetProcessImageFileNameW
GetProcessMemoryInfo
AssignProcessToJobObject
CancelWaitableTimer
CloseHandle
CompareStringW
CopyFileW
CreateDirectoryW
CreateEventW
CreateFileA
CreateFileMappingW
CreateFileW
CreateJobObjectW
CreateMutexW
CreateProcessW
CreateRemoteThread
CreateThread
CreateToolhelp32Snapshot
CreateWaitableTimerW
DecodePointer
DeleteCriticalSection
DeleteFileW
DeviceIoControl
EncodePointer
EnterCriticalSection
EnumResourceNamesW
EnumSystemLocalesW
ExitProcess
ExitThread
ExpandEnvironmentStringsW
FindClose
FindFirstFileExW
FindFirstFileW
FindNextFileW
FindResourceExW
FindResourceW
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
FreeResource
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetDriveTypeW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileSize
GetFileSizeEx
GetFileTime
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoW
GetLogicalDriveStringsW
GetLongPathNameA
GetLongPathNameW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetNativeSystemInfo
GetOEMCP
GetPrivateProfileIntW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetProcessId
GetProcessTimes
GetShortPathNameW
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetThreadContext
GetThreadPriority
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetUserDefaultLangID
GetUserDefaultUILanguage
GetVersionExW
GetWindowsDirectoryW
GlobalMemoryStatusEx
HeapAlloc
HeapDestroy
HeapFree
HeapLock
HeapReAlloc
HeapSize
HeapUnlock
HeapWalk
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedDecrement
InterlockedIncrement
InterlockedPopEntrySList
InterlockedPushEntrySList
IsBadReadPtr
IsBadWritePtr
IsDebuggerPresent
IsProcessInJob
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
IsWow64Process
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockResource
MapViewOfFile
MoveFileExW
MoveFileW
MultiByteToWideChar
OpenMutexW
OpenProcess
OpenThread
OutputDebugStringA
OutputDebugStringW
Process32FirstW
Process32NextW
QueryInformationJobObject
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadConsoleW
ReadFile
ReadProcessMemory
ReleaseMutex
RemoveDirectoryW
ReplaceFileW
ResetEvent
ResumeThread
RtlCaptureStackBackTrace
RtlUnwind
SetCurrentDirectoryW
SetEndOfFile
SetEnvironmentVariableW
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetFileTime
SetHandleInformation
SetInformationJobObject
SetLastError
SetStdHandle
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
SizeofResource
Sleep
SuspendThread
SwitchToThread
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
TzSpecificLocalTimeToSystemTime
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
WritePrivateProfileStringW
lstrcmpA
lstrcmpiA
lstrcmpiW
lstrcpynW
lstrlenA
lstrlenW
CoCreateInstance
CoInitialize
CoInitializeEx
CoSetProxyBlanket
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
DoDragDrop
OleInitialize
OleUninitialize
PropVariantClear
RegisterDragDrop
RevokeDragDrop
NdrClientCall2
RpcBindingFromStringBindingW
RpcStringBindingComposeW
GetUserNameExW
InitCommonControlsEx
GdipAlloc
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCloneImage
GdipCreateBitmapFromFile
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipCreateImageAttributes
GdipDeleteGraphics
GdipDisposeImage
GdipDisposeImageAttributes
GdipDrawImageI
GdipDrawImagePointRectI
GdipDrawImageRectRectI
GdipFree
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipGetImageGraphicsContext
GdipGetImageHeight
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageWidth
GdipSaveImageToFile
GdipSetImageAttributesColorMatrix
GdipSetImageAttributesWrapMode
GdipSetInterpolationMode
GdipSetSmoothingMode
GdiplusShutdown
GdiplusStartup
CreateEnvironmentBlock
DestroyEnvironmentBlock
Netbios
??4ShellResourceRequestDetails@@QAEAAU0@ABU0@@Z
?Wide2ASCII@installer@@YA?AV?$basic_string@DU?$char_traits@D@__1@std@@V?$allocator@D@23@@__1@std@@ABV?$basic_string@_WU?$char_traits@_W@__1@std@@V?$allocator@_W@23@@34@@Z
GetHandleVerifier
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ