Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
securityhealthsetup_e16941e14861a6d24750ecdf05c548189b33182a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
securityhealthsetup_e16941e14861a6d24750ecdf05c548189b33182a.exe
Resource
win10v2004-20241007-en
Target
securityhealthsetup_e16941e14861a6d24750ecdf05c548189b33182a.exe
Size
18.1MB
MD5
96258c71f00cc9528f18049f60ed7360
SHA1
e16941e14861a6d24750ecdf05c548189b33182a
SHA256
85ed8506f3ea081c12a0eab17edfbd8f900af0fbaa43a42ca46d8e5ad8c2e8b5
SHA512
aa912cccf4192d53f9d042e35e8f351b91fdd63d70014fc1fe2f96f33283015df8fe9887479da0c5195ef2fb47e8c4dcb201773e27fbbafc75c95098b2ec8872
SSDEEP
393216:qQ/JjHlJQGioIzxngh2+9mCP9w9XyDPB376XYTL:qyjFJQGiognCPCgDPhmXYP
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\a\_work\4\b\Bundle\amd64fre\SecurityHealthSetup.pdb
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
LoadResource
FindResourceW
GetCurrentDirectoryW
VerSetConditionMask
CloseHandle
CopyFileW
VerifyVersionInfoW
lstrcmpW
ReadConsoleW
Process32FirstW
DeleteFileW
LockResource
Process32NextW
GetLastError
Sleep
CreateToolhelp32Snapshot
OpenProcess
GetSystemDirectoryW
GetModuleFileNameW
lstrlenW
GetCurrentProcess
SizeofResource
HeapSize
SetEndOfFile
WriteConsoleW
GetModuleHandleW
DeleteCriticalSection
MultiByteToWideChar
LocalFree
FormatMessageA
GetLocaleInfoEx
WideCharToMultiByte
CreateDirectoryW
CreateFileW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
GetProcAddress
GetFileInformationByHandleEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
CompareStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapFree
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
HeapAlloc
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
GetFileType
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetProcessHeap
FlushFileBuffers
ReadFile
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCloseKey
CloseServiceHandle
OpenSCManagerW
RegCreateKeyExW
ControlService
CreateProcessWithTokenW
ImpersonateLoggedOnUser
RegSetValueExW
OpenProcessToken
StartServiceW
RegOpenKeyExW
OpenServiceW
DuplicateTokenEx
QueryServiceStatusEx
RegQueryValueExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ