Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240802-en
Target
setup.exe
Size
1.0MB
MD5
54832d3e1364c7e2c5f053fd61b19f75
SHA1
c73a43b49bb569b3ca6f300cfa077dcaae125cdd
SHA256
77e89830837a74463cead13ae8cf608ec6b5e251b716a47d9662b53515d10b22
SHA512
ba7369c5bf1862d35ce989276ba310b29ede508468f25df5839dec0b2dc89d505aeff226356bb399bdf5a3091cf332b089ecc7ec066be42a005ab1ff354e0786
SSDEEP
12288:KzjR1d96FXT41iiA8+X9pNds0D2qX65/zNmSZzghMTyOaRQC3GeJZ9hV3fF7VkFk:KQSCa15hzgS/nC3G49h99JkQXX
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\jenkins\workspace\dptf\Src\ESIF\Packages\Installers\win\generic_installer\GI\Release\GI.pdb
MultiByteToWideChar
GetFileTime
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetModuleFileNameW
GetPrivateProfileStringW
ExpandEnvironmentStringsW
GetPrivateProfileIntW
CreateMutexW
CreateThread
LoadLibraryW
GetLocalTime
GetCommandLineW
GetTickCount
SetFilePointer
WriteFile
EnumResourceLanguagesW
GetUserDefaultLangID
GetUserDefaultUILanguage
GetVersion
ConvertDefaultLocale
GetLocaleInfoW
GetVersionExW
GetCurrentProcess
GetSystemInfo
GetSystemWow64DirectoryW
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
TerminateProcess
GetExitCodeProcess
CreateEventW
SetEvent
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
ExitProcess
WriteConsoleW
ReadFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
FreeLibrary
IsValidCodePage
FindFirstFileExW
HeapReAlloc
GetFileSizeEx
FlushFileBuffers
SetEndOfFile
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapFree
HeapAlloc
GetStdHandle
GetModuleHandleExW
SetFilePointerEx
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetFileType
RtlUnwind
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
GetFileSize
CreateFileW
GetCurrentDirectoryW
RemoveDirectoryW
MoveFileW
CompareFileTime
CopyFileW
GetTempFileNameW
GetTempPathW
GetEnvironmentVariableW
GetSystemDirectoryW
GetProcessHeap
GetFileAttributesW
GetProcAddress
LoadLibraryExW
SetErrorMode
Sleep
SetFileAttributesW
MoveFileExW
TlsAlloc
DeleteFileW
WaitForSingleObject
CreateProcessW
SetLastError
VerifyVersionInfoW
VerSetConditionMask
GetWindowsDirectoryW
FindNextFileW
FindClose
FindFirstFileW
LocalFree
GetLastError
SizeofResource
LockResource
LoadResource
FindResourceW
GetModuleHandleW
TlsSetValue
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
TlsGetValue
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
SwitchToThread
InitializeCriticalSectionAndSpinCount
DecodePointer
WideCharToMultiByte
CloseHandle
CreateFileA
TlsFree
GetACP
EncodePointer
GetStringTypeW
LoadLibraryExA
VirtualQuery
VirtualProtect
RaiseException
HeapSize
SetTimer
SendDlgItemMessageW
SetDlgItemTextW
MessageBoxW
wsprintfW
DialogBoxParamW
KillTimer
EndDialog
LoadStringW
DialogBoxIndirectParamW
MonitorFromWindow
GetMonitorInfoW
OffsetRect
GetWindowLongW
AdjustWindowRect
GetWindowRect
DrawTextW
GetSystemMetrics
LoadIconW
SetRectEmpty
PostMessageW
EnableWindow
ReleaseDC
GetDC
SetFocus
ShowWindow
FillRect
SetWindowPos
GetClientRect
GetDlgItem
SetWindowTextW
MessageBoxIndirectW
LoadImageW
GetShellWindow
SendMessageTimeoutW
ExitWindowsEx
EnumWindows
SendMessageW
GetWindowThreadProcessId
GetWindowModuleFileNameW
SetBkMode
SetTextColor
GetStockObject
StretchBlt
BitBlt
GetObjectW
DeleteDC
GetTextExtentPoint32W
SelectObject
CreateCompatibleDC
DeleteObject
CreateFontW
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
RegEnumValueW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
RegSetValueExW
IsTextUnicode
RegDeleteKeyW
RegQueryInfoKeyW
CreateProcessWithTokenW
DuplicateTokenEx
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
DeleteService
ControlService
QueryServiceConfigW
StartServiceW
CloseServiceHandle
ChangeServiceConfigW
ChangeServiceConfig2W
CreateServiceW
OpenServiceW
OpenSCManagerW
QueryServiceStatus
RegEnumKeyExW
RegDeleteValueW
RegOpenKeyExW
SHCreateDirectoryExW
SHGetFolderPathW
CommandLineToArgvW
SHCreateDirectoryExA
CoInitialize
PropVariantClear
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
ord23
ord20
ord21
ord22
SetupDiCallClassInstaller
SetupDiGetDeviceInstallParamsW
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
SetupCloseInfFile
SetupFindFirstLineW
SetupGetLineTextW
SetupGetStringFieldW
SetupFindNextLine
SetupDiGetINFClassW
SetupDiSetClassInstallParamsW
SetupDiEnumDeviceInfo
SetupOpenInfFileW
PathMatchSpecA
PathIsDirectoryEmptyW
PathRemoveBackslashW
PathGetArgsW
PathIsSystemFolderW
PathIsRootW
PathRenameExtensionW
PathRemoveArgsW
PathIsDirectoryW
PathAddBackslashW
PathCombineW
PathStripToRootW
PathAppendW
PathRemoveFileSpecW
PathStripPathW
SHDeleteKeyW
PathFileExistsW
PathFindFileNameW
PathAppendA
PathFindFileNameA
PathAddBackslashA
PathRemoveFileSpecA
PathFindExtensionW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
EnumProcessModules
GetModuleFileNameExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ