Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
[Word]Setup64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
[Word]Setup64.exe
Resource
win10v2004-20230220-en
Target
[Word]Setup64.exe
Size
6.9MB
MD5
c1b3db41da3ef667d65f51c0c346f33e
SHA1
f77b3e067a7226a5b1850e66efe1ce96e45d65c4
SHA256
98aecd58f6488ade62a02749b567417525cf6ae93137956fb52eb23f9e7e10c4
SHA512
13096df6255b754da8c06c0a0c0a3c3d2eb91ab17d43f84db6819a358076071c2c062ac24e52774631023fdca5673b27037aa70d0821b7945580c3af58b2c4b6
SSDEEP
49152:13u73TdbCEYC3vX5m+aX+BZzIDQG/OPmeoOBaklSNhbX1coVbL3y3+S7Curk9OvG:IYNi4dU+fuBnOewY2sVq
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
RegCloseKey
RegCreateKeyExW
CryptAcquireContextW
CryptReleaseContext
EventWrite
EventWriteTransfer
EventRegister
EventUnregister
RegOpenKeyExW
RegQueryValueExW
RegEnumValueW
RegEnumKeyExW
RegDeleteKeyW
RegDeleteValueW
RegQueryInfoKeyW
RegSetValueExW
RegDeleteTreeW
RegGetValueW
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
CreateWellKnownSid
EqualSid
FreeSid
GetSidSubAuthority
GetSidSubAuthorityCount
IsValidSid
RevertToSelf
LookupAccountNameW
ConvertSidToStringSidW
OpenThreadToken
ChangeServiceConfigW
ChangeServiceConfig2W
CloseServiceHandle
ControlService
CreateServiceW
DeleteService
EnumDependentServicesW
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
QueryServiceStatusEx
SetServiceObjectSecurity
StartServiceW
ConvertStringSecurityDescriptorToSecurityDescriptorW
CopySid
GetLengthSid
AddAccessAllowedAce
AddAccessDeniedAce
CheckTokenMembership
GetSecurityDescriptorDacl
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ConvertSidToStringSidA
CredWriteW
CreateProcessAsUserW
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
RegNotifyChangeKeyValue
RegDeleteValueA
RegEnumValueA
RegSetKeySecurity
GetFullPathNameW
RemoveDirectoryW
SetEndOfFile
SetFileAttributesW
SetFilePointerEx
CloseHandle
DeviceIoControl
GetWindowsDirectoryW
GetModuleHandleA
GetProcAddress
CopyFileW
MoveFileExW
AreFileApisANSI
WideCharToMultiByte
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
Sleep
FreeLibrary
GetStringTypeExW
LCMapStringW
GetUserDefaultLCID
LocalFree
FormatMessageA
GetCurrentThreadId
FlsGetValue
FlsSetValue
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount64
GetModuleHandleExW
EnterCriticalSection
LeaveCriticalSection
GlobalMemoryStatusEx
K32GetProcessMemoryInfo
RaiseException
GetModuleHandleW
GetStringTypeW
VerSetConditionMask
LoadLibraryExW
VerifyVersionInfoW
GetVersionExW
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
TerminateProcess
CreateProcessW
GetModuleFileNameA
GetShortPathNameA
K32GetModuleFileNameExW
LoadResource
SizeofResource
FindResourceW
GetCurrentProcessId
OpenProcess
SetLastError
IsValidCodePage
GetUserDefaultLocaleName
GetSystemTime
FileTimeToSystemTime
SystemTimeToFileTime
GetCPInfoExW
SetErrorMode
GetComputerNameW
GetSystemDirectoryW
GetLogicalProcessorInformation
GetNativeSystemInfo
MulDiv
FormatMessageW
SetEvent
WaitForSingleObject
CreateEventW
CreateThread
WaitForMultipleObjectsEx
CreateEventExW
OutputDebugStringA
LoadLibraryW
CreateActCtxW
ActivateActCtx
DeactivateActCtx
FindActCtxSectionStringW
QueryActCtxW
CreateThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
WaitForThreadpoolWaitCallbacks
CloseThreadpoolWait
ReleaseSemaphore
WaitForSingleObjectEx
GetDiskFreeSpaceExW
TryEnterCriticalSection
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetTempPathW
GetLongPathNameW
ReleaseMutex
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
CompareFileTime
GetCommandLineW
ExpandEnvironmentStringsW
GlobalFree
ProcessIdToSessionId
WaitForMultipleObjects
GetExitCodeThread
SignalObjectAndWait
GetProcessAffinityMask
SetWaitableTimerEx
CancelWaitableTimer
CreateWaitableTimerW
GetFileSizeEx
GetTempFileNameW
ReadFile
HeapFree
GetProcessHeap
GetTickCount
FindNextFileW
FindFirstFileExW
lstrcmpW
GetFileType
WriteFile
GetOverlappedResult
SetFileInformationByHandle
GetFileInformationByHandleEx
GetDriveTypeW
CreateMutexW
CreateMutexA
CreateEventA
OpenEventA
OpenMutexA
CreateSemaphoreA
OpenSemaphoreA
OpenFileMappingA
GlobalAlloc
HeapAlloc
LocalAlloc
DeleteFileA
GetTempPathA
GetExitCodeProcess
GetPriorityClass
GetTimeZoneInformation
IsValidLocale
ResetEvent
GetSystemInfo
VirtualProtectEx
LockResource
FlushFileBuffers
CancelIoEx
GetLocaleInfoEx
LCIDToLocaleName
LocaleNameToLCID
LCMapStringEx
GetSystemDefaultLCID
ResolveLocaleName
GetSystemDefaultLocaleName
EnumSystemLocalesEx
GetDateFormatEx
GetCalendarInfoEx
GetThreadUILanguage
QueryFullProcessImageNameW
WerRegisterMemoryBlock
WerUnregisterMemoryBlock
IsProcessorFeaturePresent
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
GetThreadIOPendingFlag
RtlCaptureStackBackTrace
IsDebuggerPresent
CreateMemoryResourceNotification
QueryUnbiasedInterruptTime
IsSystemResumeAutomatic
GetSystemPowerStatus
OutputDebugStringW
RtlCaptureContext
VirtualAlloc
VirtualFree
GetLocaleInfoW
GetACP
GetUserPreferredUILanguages
GetUserGeoID
GetProductInfo
FindFirstFileW
FindClose
DeleteFileW
CreateFileW
CreateDirectoryW
GetCurrentDirectoryW
GetEnvironmentVariableW
GetThreadTimes
GetCurrentThread
GetProcessTimes
GetSystemTimeAsFileTime
LoadLibraryExA
VirtualQuery
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
SetStdHandle
EnumSystemLocalesW
ExitProcess
HeapReAlloc
HeapSize
GetConsoleCP
ReadConsoleW
GetConsoleMode
UnregisterWaitEx
VirtualProtect
FreeLibraryAndExitThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
MultiByteToWideChar
GetModuleFileNameW
CompareStringEx
SetThreadPriority
SwitchToThread
CreateTimerQueue
InterlockedFlushSList
RtlUnwindEx
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
CompareStringW
GetCPInfo
InitializeCriticalSectionAndSpinCount
EncodePointer
RtlPcToFileHeader
DuplicateHandle
GetFileAttributesExW
GetFileAttributesW
IsWow64Process
GetCurrentProcess
DeleteCriticalSection
InitializeCriticalSectionEx
FlsFree
FlsAlloc
GetThreadLocale
GetLastError
GetSystemPreferredUILanguages
GetTimeFormatW
GetDateFormatW
OpenThread
lstrcmpA
WriteConsoleW
AttachConsole
FreeConsole
AllocConsole
GetStdHandle
DecodePointer
QueryDepthSList
GetLocalTime
CoRevokeInitializeSpy
CoRegisterInitializeSpy
CreateStreamOnHGlobal
CoTaskMemAlloc
IIDFromString
CLSIDFromString
CoTaskMemFree
CoCreateInstance
CoSetProxyBlanket
CoCreateFreeThreadedMarshaler
StringFromGUID2
CoCreateGuid
CoInitializeEx
CoUninitialize
SysAllocString
SysFreeString
SysStringLen
SysAllocStringByteLen
VariantInit
VariantClear
ord13
ord14
ord10
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WinVerifyTrust
SetupIterateCabinetW
FreeAddrInfoW
GetAddrInfoW
WSAStartup
FreeMibTable
CreateSortedAddressPairs
DeleteObject
GetDeviceCaps
CreateSolidBrush
GetStockObject
SetBkColor
SetTextColor
CreateFontW
CreatePen
Rectangle
SelectObject
SetDCPenColor
GetTextMetricsW
GetTextExtentPoint32W
SetDCBrushColor
GdipCreateFromHDC
GdipDeleteGraphics
GdipDrawImageRectRectI
GdipFree
GdipAlloc
GdiplusStartup
GdipLoadImageFromStream
GdipCloneImage
GdipDisposeImage
GdipDeleteBrush
GdipCreateSolidFill
GdipGetImageWidth
GdipDrawImageRectI
GdipFillRectangleI
GdipCreateBitmapFromScan0
GdipGetImageHeight
GdipGetImageGraphicsContext
UuidToStringW
RpcStringFreeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ