Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
Setup.X64.es-es_ProPlusRetail_B9GN2-DXXQC-9DHKT-GGWCR-4X6XK_TX_DB_.exe
Resource
win10v2004-20240802-en
Target
Setup.X64.es-es_ProPlusRetail_B9GN2-DXXQC-9DHKT-GGWCR-4X6XK_TX_DB_.exe
Size
1.5MB
MD5
0ad16db1d55c9b708eac75238725c7a5
SHA1
cb197845f9fbd8f3b237e523fc0aee546a01b242
SHA256
ccc66cf4c495d627d87f05b818af3c126df1a259205ce7841b3fc8e2e57bce00
SHA512
5c8fe9261b33e4b4f5a50d31b2334dbdd8a16335d4ccf05a3fb661383a3f52989ada26510079aeac79182c350582e358a71e6db7bb2975c608eb1d0abcde1633
SSDEEP
24576:MnGrgkMvFVOwzw3F344tBpkrQsVR+yJbw+1W:Ft26F34cKksVlbwQW
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
P:\Target\x64\ship\click2run\en-us.pre\bootstrapper.pdb
RegCloseKey
RegCreateKeyExW
CredWriteW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
CreateProcessAsUserW
RegDeleteTreeW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
RegGetValueW
GetTokenInformation
OpenProcessToken
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
LookupAccountNameW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RevertToSelf
EventWrite
EventUnregister
EventRegister
GetLongPathNameW
LCIDToLocaleName
GetShortPathNameA
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
Sleep
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
DeleteFileW
CloseHandle
GetLocalTime
GetComputerNameW
WriteFile
GetCurrentProcessId
SetEvent
CreateEventExW
GetTickCount64
WaitForMultipleObjects
GetSystemTimeAsFileTime
RaiseException
GlobalAlloc
GlobalFree
SetLastError
CreateDirectoryW
FindClose
FindFirstFileExW
GetFileAttributesExW
SetFileAttributesW
SetFilePointerEx
GetTickCount
FormatMessageW
WideCharToMultiByte
CreateEventW
IsProcessorFeaturePresent
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
WaitForSingleObject
TerminateProcess
GetCurrentThread
GetThreadIOPendingFlag
TryEnterCriticalSection
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
QueryDepthSList
SetWaitableTimerEx
CancelWaitableTimer
CreateWaitableTimerW
ReleaseMutex
WaitForMultipleObjectsEx
CreateMutexA
CreateEventA
OpenProcess
MapViewOfFile
UnmapViewOfFile
CreateSemaphoreA
CreateFileMappingA
GetModuleFileNameA
WerRegisterMemoryBlock
WerUnregisterMemoryBlock
CreateThread
GetProcessAffinityMask
ResetEvent
MulDiv
WaitForSingleObjectEx
GetSystemDirectoryW
CreateMemoryResourceNotification
FreeLibrary
LoadLibraryExW
IsSystemResumeAutomatic
GetSystemPowerStatus
ReleaseSemaphore
GetCommandLineW
GetStartupInfoW
EncodePointer
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
HeapFree
HeapAlloc
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
HeapSetInformation
GetVersion
HeapCreate
QueryPerformanceCounter
HeapSize
GetLocaleInfoW
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
SetFilePointer
GetConsoleCP
GetConsoleMode
LCMapStringW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetStdHandle
WriteConsoleW
CreateFileW
FlushFileBuffers
InitializeCriticalSection
GetVersionExW
GetUserGeoID
GetSystemDefaultLCID
ExpandEnvironmentStringsW
LocaleNameToLCID
GetDriveTypeW
GetLogicalDriveStringsW
QueryDosDeviceW
CreateMutexW
FreeConsole
AttachConsole
AllocConsole
K32GetProcessImageFileNameW
LocalFree
GetShortPathNameW
LoadResource
LockResource
SizeofResource
FindResourceW
GetLocaleInfoEx
OutputDebugStringA
OpenThread
GetExitCodeThread
GetModuleHandleExW
CreateActCtxW
ActivateActCtx
DeactivateActCtx
FindActCtxSectionStringW
QueryActCtxW
MoveFileExW
LocalAlloc
LoadLibraryA
GetOverlappedResult
lstrcmpW
RemoveDirectoryW
FindNextFileW
FindFirstFileW
GetCurrentDirectoryW
K32GetModuleFileNameExW
GetTempPathW
GetStringTypeExW
DecodePointer
DeleteFileA
GetTempPathA
GetProcessHeap
SetEndOfFile
MultiByteToWideChar
RaiseFailFastException
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
CompareStringEx
IsWow64Process
GetCurrentProcess
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
QueryFullProcessImageNameW
VerSetConditionMask
GetDiskFreeSpaceExW
GetNativeSystemInfo
VerifyVersionInfoW
ProcessIdToSessionId
GetTempFileNameW
ReadFile
CopyFileW
GetFullPathNameW
GetExitCodeProcess
CreateProcessW
GetPriorityClass
K32EnumProcesses
CoRevokeInitializeSpy
CoRegisterInitializeSpy
CreateStreamOnHGlobal
CoCreateInstance
CoCreateGuid
CoTaskMemFree
StringFromGUID2
CoInitializeEx
CoUninitialize
StringFromIID
GetAddrInfoW
WSAStartup
FreeAddrInfoW
CreateFontW
CreateSolidBrush
DeleteObject
GetDeviceCaps
GetStockObject
Rectangle
SelectObject
SetDCPenColor
GetTextMetricsW
GetTextExtentPoint32W
SetBkColor
CreatePen
SetDCBrushColor
SetTextColor
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdipGetImageWidth
GdipLoadImageFromStream
GdipGetImageHeight
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipDeleteGraphics
GdipAlloc
GdipFillRectangleI
GdipDrawImageRectI
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdiplusStartup
GdipFree
RpcBindingFromStringBindingW
RpcStringBindingComposeW
RpcStringFreeW
RpcBindingSetAuthInfoW
RpcBindingFree
RpcMgmtIsServerListening
SysFreeString
VariantInit
VariantClear
SysAllocString
SetupIterateCabinetW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ