Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8c9ac185b2f72d29708a4db7f6e90987.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c9ac185b2f72d29708a4db7f6e90987.exe
Resource
win10v2004-20231215-en
Target
8c9ac185b2f72d29708a4db7f6e90987
Size
602KB
MD5
8c9ac185b2f72d29708a4db7f6e90987
SHA1
f88ff90c97994b394c186af4ed7baf099bedb138
SHA256
066c88750c0d17aeab01fc2b27478512fd3e15c0411b0d841891521e7d0b4005
SHA512
15465a09f95c2ed9e700ef84e2cf1905e4c397b1b9fb28a5326052b6edeb017cba71612b9937d120aa62a0632494e80e5bf458a7dfce503663362b02e7f4f29c
SSDEEP
12288:SrwQwDfT8qx+lXvbunjmWf8wKWQoHq2QRk:S3wDfTJxCXvbunj5TlQp2QR
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\src\wix38\build\ship\x86\burn.pdb
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
InitiateSystemShutdownExW
GetUserNameW
RegCloseKey
RegQueryValueExW
RegDeleteValueW
ConvertStringSecurityDescriptorToSecurityDescriptorW
DecryptFileW
CreateWellKnownSid
InitializeAcl
SetEntriesInAclW
ChangeServiceConfigW
CloseServiceHandle
OpenSCManagerW
OpenServiceW
QueryServiceStatus
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
SetNamedSecurityInfoW
CheckTokenMembership
AllocateAndInitializeSid
SetEntriesInAclA
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
GetTokenInformation
RegOpenKeyExW
QueryServiceConfigW
GetMessageW
PeekMessageW
PostMessageW
SetWindowLongW
PostQuitMessage
DispatchMessageW
DefWindowProcW
RegisterClassW
UnregisterClassW
CreateWindowExW
LoadCursorW
MessageBoxW
LoadBitmapW
TranslateMessage
GetWindowLongW
IsWindow
MsgWaitForMultipleObjects
WaitForInputIdle
PostThreadMessageW
GetMonitorInfoW
MonitorFromPoint
IsDialogMessageW
GetCursorPos
SysFreeString
SysAllocString
VariantInit
VariantClear
GetObjectW
StretchBlt
SelectObject
DeleteObject
CreateCompatibleDC
DeleteDC
ShellExecuteExW
SHGetFolderPathW
CommandLineToArgvW
CoTaskMemFree
CoInitializeSecurity
CLSIDFromProgID
CoCreateInstance
StringFromGUID2
CoInitialize
CoInitializeEx
CoUninitialize
GetVersionExW
CompareStringW
VerSetConditionMask
FreeLibrary
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
GetSystemTime
lstrlenW
GetModuleHandleExW
GetSystemDirectoryW
GetTempPathW
GetWindowsDirectoryW
GetSystemWow64DirectoryW
GetComputerNameW
VerifyVersionInfoW
GetVolumePathNameW
GetDateFormatW
GetSystemDefaultLangID
GetUserDefaultLangID
GetStringTypeW
ExpandEnvironmentStringsW
GetFileAttributesW
ReadFile
SetFilePointerEx
CreateFileW
InterlockedExchange
InterlockedCompareExchange
LoadLibraryW
lstrlenA
RemoveDirectoryW
CreateEventW
OutputDebugStringW
ProcessIdToSessionId
OpenProcess
GetProcessId
WaitForSingleObject
WriteFile
ConnectNamedPipe
SetNamedPipeHandleState
CreateNamedPipeW
CreateThread
GetExitCodeThread
FindClose
SetFileAttributesW
FindFirstFileW
FindNextFileW
GetModuleHandleW
WaitForMultipleObjects
InterlockedIncrement
InterlockedDecrement
DuplicateHandle
CreateProcessW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetExitCodeProcess
SetThreadExecutionState
CopyFileExW
ResetEvent
SetEndOfFile
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateFileA
CompareStringA
MapViewOfFile
UnmapViewOfFile
CreateMutexW
CreateFileMappingW
VirtualAlloc
VirtualFree
GetSystemTimeAsFileTime
DeleteFileW
GetThreadLocale
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CloseHandle
Sleep
ReleaseMutex
DeleteCriticalSection
InitializeCriticalSection
GetLastError
GetTimeZoneInformation
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
HeapFree
RaiseException
HeapAlloc
IsProcessorFeaturePresent
IsDebuggerPresent
TerminateProcess
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
MoveFileExW
CopyFileW
RtlUnwind
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCurrentThreadId
GetCurrentProcess
LocalFree
HeapSetInformation
LoadLibraryExW
SetEvent
HeapReAlloc
HeapSize
LCMapStringW
SetStdHandle
WriteConsoleW
FlushFileBuffers
SetFilePointer
GetLocalTime
FormatMessageW
GetTempFileNameW
CreateDirectoryW
GetFullPathNameW
GetModuleHandleA
GlobalAlloc
GetCurrentProcessId
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
GetFileType
GetProcessHeap
GetModuleFileNameW
GetStdHandle
GetFileSizeEx
MultiByteToWideChar
ExitProcess
DecodePointer
GetCommandLineW
SetLastError
EncodePointer
GlobalFree
ord20
ord22
ord23
CertGetCertificateContextProperty
CryptHashPublicKeyInfo
ord118
ord115
ord171
ord125
ord17
ord8
ord116
ord111
ord173
ord45
ord205
ord90
ord141
ord137
ord169
ord70
ord88
ord190
ord238
UuidCreate
HttpQueryInfoW
InternetOpenW
InternetCloseHandle
InternetConnectW
InternetReadFile
InternetSetOptionW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
InternetErrorDlg
InternetCrackUrlW
WTHelperGetProvSignerFromChain
CryptCATAdminCalcHashFromFileHandle
WTHelperProvDataFromStateData
WinVerifyTrust
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE