Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Target
wsainstall.exe
Size
5.7MB
MD5
9c95885e1608246c6a930f86c7fd8b48
SHA1
4b61cead3b68e2940d683f8c81f16e9d80d3637a
SHA256
7bf85a4e8d86dd8bb5e29e4e073978a0d8ffb8e1431f646aaad75fff44f3f732
SHA512
1f21f1a8b6b861d5791af394227e3b32d676c6ab801698af600ce4d42e65cfe8f27bd7e4f413cb3618cb6765b19705afed73b58139fec807494160047735b817
SSDEEP
98304:tjm6NFRPxdaT/fqinKP+w3qIe4cFec7p0qCVfTH:s6NFp3V+w3qhFfkfT
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
LocalFileTimeToFileTime
GetCurrentThreadId
GetLocalTime
GetDiskFreeSpaceExW
GetSystemTimeAsFileTime
RemoveDirectoryW
GetDriveTypeW
CreateDirectoryW
CreateFileW
GetFileAttributesW
SetUnhandledExceptionFilter
GetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ExpandEnvironmentStringsW
ProcessIdToSessionId
VirtualFree
GetModuleHandleA
OpenProcess
GetLocaleInfoW
GetModuleHandleW
LoadResource
LockResource
SizeofResource
FindResourceW
WriteFile
CheckRemoteDebuggerPresent
FileTimeToSystemTime
GetVolumeInformationW
SetErrorMode
GetComputerNameW
GlobalFree
GetExitCodeProcess
DeleteFileW
DecodePointer
HeapSize
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
FindFirstFileExW
GetPrivateProfileStringW
GetUserDefaultUILanguage
CopyFileW
GetTimeFormatW
GetDateFormatW
SystemTimeToFileTime
FileTimeToLocalFileTime
TerminateThread
WaitForMultipleObjects
GetCommandLineA
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
OpenEventW
CreateEventW
ReleaseMutex
DuplicateHandle
GetCommandLineW
GetProcAddress
FreeLibrary
ExitProcess
SetEvent
GlobalAlloc
GetTickCount64
WaitForSingleObject
CloseHandle
Sleep
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThread
GlobalLock
GlobalUnlock
DeviceIoControl
LocalAlloc
LocalFree
GetSystemTime
VerSetConditionMask
VerifyVersionInfoW
GetFileSizeEx
SetHandleInformation
UnmapViewOfFile
SetFileAttributesW
CreateFileMappingA
MoveFileExW
MapViewOfFile
GetTickCount
MoveFileW
MulDiv
CreateMutexW
LoadLibraryW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcessTimes
GetSystemDirectoryA
LoadLibraryA
ResetEvent
SetFilePointer
SetEndOfFile
CreateSemaphoreW
GetSystemInfo
CreateFileMappingW
AssignProcessToJobObject
ResumeThread
GetFileSize
SetThreadPriority
FindResourceA
CreateThread
QueryDosDeviceW
CreateEventA
TryAcquireSRWLockShared
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockShared
SwitchToThread
OutputDebugStringA
WaitForSingleObjectEx
CompareFileTime
TryEnterCriticalSection
GetSystemPowerStatus
LoadLibraryExW
VirtualProtectEx
ReadFile
WTSGetActiveConsoleSessionId
ReleaseSemaphore
CreateSemaphoreA
GetFileAttributesA
CreateFileA
DeleteFileA
CreateDirectoryA
GetShortPathNameW
ReadProcessMemory
VirtualQueryEx
GetProcessIoCounters
CancelIoEx
GetOverlappedResult
GetFileAttributesExW
QueryFullProcessImageNameW
Thread32Next
Thread32First
CreateToolhelp32Snapshot
OpenThread
AreFileApisANSI
FindFirstFileW
CompareStringW
SetLastError
GetFullPathNameW
FindNextFileW
GetLongPathNameW
GetStdHandle
GetCPInfo
GetProcessAffinityMask
SetFileTime
GetModuleFileNameW
FoldStringW
CreateHardLinkW
FindClose
GetVersionExW
GetSystemDirectoryW
GetConsoleMode
TzSpecificLocalTimeToSystemTime
IsDBCSLeadByte
SetThreadExecutionState
SystemTimeToTzSpecificLocalTime
GetFileType
FlushFileBuffers
GetOEMCP
PeekNamedPipe
GetACP
IsValidCodePage
GetFileInformationByHandle
VerLanguageNameW
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
InitializeSRWLock
InitializeCriticalSectionEx
GetExitCodeThread
QueryPerformanceFrequency
RtlUnwind
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ReadConsoleW
GetConsoleOutputCP
SetFilePointerEx
SetStdHandle
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetStringTypeW
CreateProcessW
TranslateMessage
EndPaint
BeginPaint
PostQuitMessage
FillRect
DrawTextW
CreateWindowExW
CallWindowProcW
DrawIcon
DrawFrameControl
FindWindowA
SetRect
SetCursor
LoadCursorW
SetLayeredWindowAttributes
MoveWindow
AttachThreadInput
ClientToScreen
DrawTextA
OffsetRect
GetClassNameA
SetWindowTextW
InflateRect
GetMonitorInfoW
GetShellWindow
MonitorFromRect
EqualRect
FindWindowExW
SystemParametersInfoW
FindWindowExA
UnhookWindowsHookEx
WaitForInputIdle
CallNextHookEx
MapWindowPoints
GetFocus
GetMessagePos
SendInput
GetGUIThreadInfo
SetWindowsHookExW
MapVirtualKeyExW
CreateDesktopW
CharToOemBuffW
OemToCharA
CharToOemA
OemToCharBuffA
CharLowerW
CharUpperW
GetMessageW
PostThreadMessageW
LockWorkStation
DispatchMessageW
GetWindowLongW
wsprintfW
EnumWindows
GetDC
IsWindowVisible
EnumDisplayDevicesW
GetGuiResources
ReleaseDC
GetWindowDC
PtInRect
MessageBoxW
MessageBeep
GetAncestor
GetForegroundWindow
keybd_event
GetAsyncKeyState
GetKeyboardLayout
GetWindowTextW
SwitchToThisWindow
IsWindow
DestroyIcon
LoadImageA
LoadImageW
SetTimer
GetClientRect
SetWindowRgn
SetWindowPos
GetWindowRect
DestroyWindow
DefWindowProcW
CheckMenuItem
EnableWindow
IsIconic
InvalidateRect
GetWindowThreadProcessId
FindWindowW
GetDesktopWindow
SetForegroundWindow
TrackPopupMenu
AppendMenuW
EnableMenuItem
DestroyMenu
CreatePopupMenu
PostMessageW
GetSystemMetrics
UpdateWindow
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
KillTimer
ShowWindow
SetFocus
SendMessageW
SetWindowTextA
ScreenToClient
GetCursorPos
GetWindowTextA
GetMessageExtraInfo
SetMessageExtraInfo
UnhookWinEvent
SetWinEventHook
SetWindowLongW
ExcludeClipRect
GetDeviceCaps
CreateDIBSection
DeleteDC
BitBlt
SetTextColor
SelectObject
CreateCompatibleDC
DeleteObject
CreateRoundRectRgn
SetBkMode
GetStockObject
CreateCompatibleBitmap
GetPixel
CreateSolidBrush
CreatePen
SetWorldTransform
SetDCPenColor
RoundRect
SetStretchBltMode
SetDCBrushColor
Rectangle
StretchBlt
SetGraphicsMode
PatBlt
SetPixel
IntersectClipRect
ExtTextOutW
SetBkColor
SelectClipRgn
MoveToEx
LineTo
CreateFontA
GetObjectW
SetBrushOrgEx
CombineRgn
CreateRectRgn
SetEntriesInAclW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegGetValueW
RegOpenKeyExW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
UnregisterTraceGuids
RegisterTraceGuidsW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
GetUserNameW
TraceMessage
DuplicateTokenEx
GetLengthSid
SetThreadToken
OpenProcessToken
ConvertStringSidToSidW
SetTokenInformation
GetTokenInformation
SetSecurityInfo
InitializeAcl
CheckTokenMembership
FreeSid
CreateWellKnownSid
AllocateAndInitializeSid
RegNotifyChangeKeyValue
OpenSCManagerA
CreateProcessAsUserW
GetFileSecurityW
SetNamedSecurityInfoW
BuildExplicitAccessWithNameW
GetAce
GetAclInformation
GetSecurityDescriptorDacl
ConvertSidToStringSidW
IsValidSid
RegOpenKeyW
RegEnumKeyExW
SetFileSecurityW
AdjustTokenPrivileges
LookupPrivilegeValueW
GdiplusStartup
GdiplusShutdown
GdipGetImageHeight
GdipDrawImageRect
GdipDisposeImage
GdipCreateFromHDC
GdipDeleteGraphics
GdipGetImageWidth
GdipLoadImageFromStream
getaddrinfo
WSAAddressToStringA
freeaddrinfo
closesocket
gethostbyname
inet_addr
send
socket
htons
connect
CreateStreamOnHGlobal
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ