Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
ADPClientService.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ADPClientService.exe
Resource
win10v2004-20230915-en
Target
ADPClientService.exe
Size
1.2MB
MD5
4a1abb27d385cfa93ded2cbf046ae4ab
SHA1
72c3f774080bf48192c25629112588fa82538757
SHA256
334f113ea5d36a4659db35a3a49b34aef81751ce28c4cf674520692d5504302a
SHA512
d849f0174d14d1ffb6023b67ba027c6bb9387f86bded92dcfb80238fd68498efdfea599af402cfc8db17177288fb42d2aebab90e70c2afae8ef9cbf847afa8da
SSDEEP
24576:JaVsVmAZU6BE4MBqwvvvaf0xH7yVLukHNu2dj3vOLT11WANq:JaeVmAZU6UBqwPzk7jfG11WANq
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
CryptReleaseContext
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
RegCreateKeyExW
RegSetValueExW
CryptGenRandom
CryptGetHashParam
CryptCreateHash
CryptAcquireContextA
htonl
ntohl
ioctlsocket
connect
WSAStartup
gethostname
WSACleanup
getaddrinfo
freeaddrinfo
sendto
recvfrom
listen
accept
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
WSAGetLastError
closesocket
bind
send
recv
WSASetLastError
select
__WSAFDIsSet
socket
inet_ntop
CertGetNameStringW
CertFreeCertificateContext
ord211
ord50
ord46
ord143
ord41
ord22
ord26
ord27
ord60
ord32
ord301
ord200
ord30
ord79
ord35
ord33
IdnToAscii
FindFirstFileExW
GetFullPathNameW
SetStdHandle
HeapReAlloc
GetTimeZoneInformation
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetProcessHeap
IsValidLocale
GetTimeFormatW
GetDateFormatW
HeapFree
HeapAlloc
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
GetCommandLineW
GetCommandLineA
WriteFile
ExitProcess
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
SetFilePointerEx
FreeLibraryAndExitThread
ExitThread
LoadLibraryExW
WriteConsoleW
SetEndOfFile
RtlUnwind
InitializeSListHead
GetVolumeInformationW
GetSystemWindowsDirectoryW
MultiByteToWideChar
WideCharToMultiByte
GetLastError
lstrcmpiW
GetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateFileW
GetFileTime
CloseHandle
lstrlenW
HeapSize
GetModuleFileNameW
QueryFullProcessImageNameW
GetTempPathW
RemoveDirectoryW
GetCurrentProcess
LocalFree
SetFileAttributesW
SetLastError
FindFirstFileW
lstrcmpW
FindNextFileW
FindClose
DeleteFileW
GetDiskFreeSpaceExW
GetFileSizeEx
MoveFileExW
CopyFileW
OpenProcess
CreateProcessW
TerminateProcess
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
GetCurrentThreadId
GetTickCount64
Sleep
ReadFile
FormatMessageW
IsWow64Process
RaiseException
IsDebuggerPresent
CreateMutexW
OpenMutexW
ReleaseMutex
InitializeConditionVariable
InitializeCriticalSection
WakeAllConditionVariable
WakeConditionVariable
EnterCriticalSection
SleepConditionVariableCS
LeaveCriticalSection
CreateThread
InitializeCriticalSectionEx
GetSystemPowerStatus
GetProcAddress
FreeLibrary
DeleteCriticalSection
SleepEx
VerSetConditionMask
GetSystemDirectoryA
GetModuleHandleA
LoadLibraryA
VerifyVersionInfoA
FormatMessageA
WaitForSingleObjectEx
GetStdHandle
GetFileType
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
QueryPerformanceCounter
GetStartupInfoW
ResetEvent
SetEvent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
DecodePointer
EncodePointer
GetModuleHandleW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
CreateEventW
InitializeCriticalSectionAndSpinCount
GetStringTypeW
GetModuleHandleExW
GetWindowThreadProcessId
DefWindowProcW
SetWindowLongW
PostThreadMessageW
GetWindowTextW
SendMessageW
RegisterClassExW
CreateWindowExW
GetClassNameW
SendMessageTimeoutW
PostMessageW
ChangeWindowMessageFilterEx
GetSystemMetrics
EnumWindows
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
SHGetKnownFolderPath
SHCreateDirectoryExW
CoInitializeEx
CoSetProxyBlanket
CoTaskMemFree
CoCreateInstance
CoUninitialize
SysFreeString
VariantInit
VariantTimeToDosDateTime
SysAllocString
VariantClear
GetUserNameExW
GetAdaptersAddresses
RpcStringFreeW
UuidToStringW
UuidCreate
PathFileExistsW
PathFindExtensionW
PathIsRelativeW
PathCanonicalizeW
PathAppendW
PathRemoveBackslashW
PathFindFileNameW
PathRemoveFileSpecW
PathRemoveExtensionW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WinVerifyTrust
WTHelperGetProvCertFromChain
ImageNtHeader
ObtainUserAgentString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ