Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
update_28_05_2024_9864714.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
update_28_05_2024_9864714.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
update_28_05_2024_9864714.exe
Resource
win11-20240508-en
Target
update_28_05_2024_9864714.exe
Size
14.2MB
MD5
4337883699d85505097016856dea629c
SHA1
58e5e4ae453c2cded93e05a42b31437b59a8ea03
SHA256
0851fd5671640a9acaf688e2886570759364135915f272d4ff7946fe001b3f4c
SHA512
185550ae2c7cb69716349871fb4bb3e84ee079a06838c68d3be4b988af91159c998db9797c78ff0391d4136a6adb577a229dd3d2e927b58a2819d6a9b84ca509
SSDEEP
393216:h+W+VsfIVCT5UJAKQNX5bENYm5IV3TcLWGO7tZkrCfq:h+VVeIq5/Jbm5kAKq
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\BITDIR\AVRETAIL\qhav\bin\Upgrade\x64\Release\upgui.pdb
DeleteCriticalSection
GetLongPathNameW
GetModuleFileNameW
WideCharToMultiByte
GetPrivateProfileIntW
GetPrivateProfileStringW
OutputDebugStringW
FreeLibrary
LoadLibraryExW
GetCommandLineW
LocalFree
MultiByteToWideChar
WriteFile
CreateFileW
CloseHandle
OutputDebugStringA
LocalAlloc
LoadLibraryA
SizeofResource
HeapFree
InitializeCriticalSection
CreateMutexW
InitializeCriticalSectionEx
ReleaseMutex
HeapSize
LockResource
HeapReAlloc
RaiseException
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
GetCurrentDirectoryW
HeapDestroy
SetCurrentDirectoryW
GetWindowsDirectoryW
GetProcessHeap
CopyFileW
OpenMutexW
WriteConsoleW
FlushFileBuffers
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
VerSetConditionMask
IsProcessorFeaturePresent
GetProcAddress
GetLastError
GetFullPathNameW
GetVersionExW
GetCommandLineA
GetCPInfo
GetOEMCP
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryEnterCriticalSection
GetCurrentThreadId
QueryPerformanceCounter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetConsoleMode
GetFileType
GetFileAttributesExW
ExitProcess
GetModuleHandleExW
GetStdHandle
SetStdHandle
SetFilePointerEx
GetConsoleOutputCP
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetSystemMetrics
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ