Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
TUKAcad_CPE_2024.06.26_x64_Subscription_setup.exe
Resource
win10v2004-20240709-en
Target
TUKAcad_CPE_2024.06.26_x64_Subscription_setup.exe
Size
159.8MB
MD5
9faa054b52e9bd547ce507ca27bdd646
SHA1
a05225134754ef1f7c3497acfd658069932112c2
SHA256
4c6bc7c8baf45030d1975ab66fda0ad887bf4aea4d296b1e157540066cb9deb5
SHA512
2c16110a716bda27588f6a2560ec3e5a2440df854c36094b27839bbfe085e40df26477e870ba0f4d999473539a01c8b5869bedce447d1043d749b15a269590b7
SSDEEP
3145728:IuMR+HkmRt/bA12NhMl1/G/EPQYfJL2ccdeJOzlbY1XK:IgEybA1sMm/E9fRXiB
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\CodeBases\isdev\redist\Language Independent\x64\setup.pdb
ord17
GetSystemTimeAsFileTime
GetPrivateProfileStringW
MoveFileW
GetSystemInfo
MulDiv
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadLibraryExW
GetVersion
GetLocalTime
IsValidLocale
GetCommandLineW
SetEnvironmentVariableW
GetFileAttributesW
GetCurrentProcessId
GlobalAlloc
GlobalFree
FlushFileBuffers
VirtualQuery
IsBadReadPtr
GetDiskFreeSpaceExW
GetDriveTypeW
GetCurrentProcess
GetExitCodeProcess
GetCurrentThread
GetLocaleInfoW
VirtualProtect
LoadLibraryExA
GetModuleHandleW
GetProcAddress
GetSystemDirectoryA
LoadLibraryA
GetLastError
SetLastError
CreateFileW
GetFileSize
CloseHandle
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
ReadFile
SetFilePointer
WriteFile
HeapAlloc
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
LCMapStringW
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetACP
GetStdHandle
GetModuleHandleExW
ExitProcess
GetFullPathNameW
RtlUnwind
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
RtlPcToFileHeader
RtlUnwindEx
InitializeCriticalSectionEx
SetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
CreateDirectoryW
CompareFileTime
VerLanguageNameW
GetUserDefaultLangID
GetSystemDefaultLangID
lstrcmpiW
lstrcmpW
LoadLibraryW
FreeLibrary
CompareStringA
CompareStringW
lstrcatW
GetVersionExW
CreateEventW
QueryPerformanceFrequency
GetTempFileNameW
CopyFileW
GetTickCount
GetExitCodeThread
CreateThread
WaitForSingleObject
FindResourceW
GlobalUnlock
GlobalLock
SizeofResource
LockResource
LoadResource
lstrcpyW
SetErrorMode
GetTempPathW
ExpandEnvironmentStringsW
FormatMessageW
LocalFree
GetWindowsDirectoryW
GetSystemDirectoryW
CreateProcessW
Sleep
RemoveDirectoryW
DeleteFileW
lstrlenW
lstrcpynW
GetModuleFileNameW
GetProcessHeap
HeapFree
LocalAlloc
SystemTimeToFileTime
lstrcmpA
ResetEvent
SetEvent
GetTimeFormatW
GetDateFormatW
FindResourceExW
OpenProcess
GetProcessTimes
SetFileTime
GetCurrentDirectoryW
InitializeSListHead
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
OutputDebugStringW
IsDebuggerPresent
DefWindowProcW
CreateWindowExW
RegisterClassW
DispatchMessageW
TranslateMessage
GetMessageW
PostMessageW
SetTimer
KillTimer
CharPrevW
SendDlgItemMessageW
wvsprintfW
LoadImageW
CreateDialogParamW
MoveWindow
SetCursor
GetWindow
GetDlgItemTextW
EnableWindow
SetFocus
SetForegroundWindow
PostQuitMessage
SetDlgItemTextW
IsDialogMessageW
FindWindowW
SubtractRect
IntersectRect
SetRect
FillRect
GetSysColorBrush
GetSysColor
GetWindowRect
GetDC
GetSystemMetrics
GetDlgCtrlID
CreateDialogIndirectParamW
DestroyWindow
IsWindow
SendMessageW
MessageBoxW
CharNextW
WaitForInputIdle
SetWindowLongPtrW
GetWindowLongPtrW
GetClientRect
EndPaint
BeginPaint
ReleaseDC
GetWindowDC
SetWindowPos
SetWindowTextW
GetDlgItem
EndDialog
ExitWindowsEx
CharUpperW
DialogBoxIndirectParamW
ShowWindow
GetDesktopWindow
MsgWaitForMultipleObjects
PeekMessageW
wsprintfW
LoadIconW
LoadCursorW
SetActiveWindow
TranslateCharsetInfo
UnrealizeObject
CreateHalftonePalette
GetDIBColorTable
SelectPalette
RealizePalette
GetSystemPaletteEntries
CreatePalette
CreateFontW
GetObjectW
SetTextColor
SetBkMode
GetDeviceCaps
CreateSolidBrush
CreateFontIndirectW
SetStretchBltMode
StretchBlt
SelectObject
DeleteDC
CreateDIBitmap
CreateCompatibleDC
BitBlt
DeleteObject
GetStockObject
GetTokenInformation
RegOpenKeyExW
CryptDestroyHash
CryptCreateHash
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
RegOpenKeyW
RegOverridePredefKey
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryValueExW
RegCloseKey
FreeSid
EqualSid
AllocateAndInitializeSid
OpenThreadToken
OpenProcessToken
SetEntriesInAclW
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CreateWellKnownSid
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegEnumValueW
RegCreateKeyExW
RegDeleteValueW
SHGetMalloc
SHGetPathFromIDListW
SHGetFolderPathW
SHBrowseForFolderW
CommandLineToArgvW
ShellExecuteExW
ShellExecuteW
StringFromGUID2
CoCreateGuid
CLSIDFromProgID
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitializeSecurity
CoInitialize
CoTaskMemRealloc
SetErrorInfo
GetErrorInfo
CreateErrorInfo
VarUI4FromStr
SystemTimeToVariantTime
RegisterTypeLi
LoadTypeLi
VarBstrFromDate
UnRegisterTypeLi
SysAllocStringLen
SysFreeString
SysReAllocStringLen
SysStringLen
VarBstrCat
SysAllocStringByteLen
SysStringByteLen
SysAllocString
PathFileExistsW
UuidToStringW
UuidCreate
RpcStringFreeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ