Extended Key Usages
ExtKeyUsageCodeSigning
Overview
overview
8Static
static
1ExxxxSet_up.exe.lnk
windows7-x64
8ExxxxSet_up.exe.lnk
windows10-2004-x64
8UP/ii.dll
windows7-x64
1UP/ii.dll
windows10-2004-x64
1UP/machine_64.dll
windows7-x64
7UP/machine_64.dll
windows10-2004-x64
7UP/psmachi...64.dll
windows7-x64
1UP/psmachi...64.dll
windows10-2004-x64
1UP/updateres_sv.dll
windows7-x64
1UP/updateres_sv.dll
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
ExxxxSet_up.exe.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ExxxxSet_up.exe.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
UP/ii.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
UP/ii.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
UP/machine_64.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
UP/machine_64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
UP/psmachine_arm64.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
UP/psmachine_arm64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
UP/updateres_sv.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
UP/updateres_sv.dll
Resource
win10v2004-20241007-en
Target
5e276e821f3d3d0aefa466e229fbe8b1ffe92503f41349d2bd1d99e2a11c0a8c.zip
Size
25.5MB
MD5
4ee343ada47e98fdb16cab2157ba4bdd
SHA1
0e844700a660eab07d6358d9089b08ffcbe6dfdd
SHA256
5e276e821f3d3d0aefa466e229fbe8b1ffe92503f41349d2bd1d99e2a11c0a8c
SHA512
a849441365d04e5e7d9f04bfe2c3bddbc6c7a96cd01ea7d65ca54a15b189dac3f74b22154cec3c7aa5be6852730cfc8d0ad66ef0d743011a35f1be7cf5f6fc9f
SSDEEP
196608:11xOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxOxUrHLLLLLLLLLLurH9:vYYYYYYYYYYYYYYYYYYYYYYmrOr57
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
psmachine_unsigned_64.pdb
SizeofResource
SetThreadLocale
HeapFree
EnterCriticalSection
lstrlenW
lstrcpynW
GetModuleFileNameW
GetThreadLocale
EncodePointer
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
HeapSize
MultiByteToWideChar
GetLastError
HeapReAlloc
RaiseException
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
GetProcAddress
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
FreeLibrary
lstrcmpiW
LoadLibraryExW
TryEnterCriticalSection
InitializeCriticalSection
CreateMutexW
WaitForSingleObject
ReleaseMutex
CreateEventW
Sleep
SetEvent
CloseHandle
ResetEvent
GetTickCount
CreateDirectoryW
SetLastError
FindNextFileW
GetCurrentProcess
GetEnvironmentVariableW
FindClose
LockResource
FindResourceExW
GetVersionExW
VerSetConditionMask
VerifyVersionInfoW
GetShortPathNameW
TerminateProcess
WaitForSingleObjectEx
GetCurrentProcessId
WriteFile
SetFilePointer
CreateFileW
GetFileAttributesExW
MoveFileExW
GetSystemTimeAsFileTime
FlushFileBuffers
WideCharToMultiByte
GetPrivateProfileIntW
OutputDebugStringA
GetCurrentThreadId
GetFileInformationByHandle
OutputDebugStringW
GetLocalTime
lstrcmpW
GetSystemDirectoryW
VirtualQuery
GetStdHandle
ExitProcess
IsDebuggerPresent
GetModuleHandleExW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwindEx
InterlockedFlushSList
RtlPcToFileHeader
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemInfo
VirtualProtect
LCMapStringW
GetFileType
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
SetFilePointerEx
SetStdHandle
GetConsoleOutputCP
GetConsoleMode
WriteConsoleW
LoadLibraryExA
InitOnceExecuteOnce
GetComputerNameExW
InitializeCriticalSectionEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ