Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
Office_Deployment_Tools_2019_-3_MLF_X22-09817 (7).exe
Resource
win11-20240611-en
Target
Office_Deployment_Tools_2019_-3_MLF_X22-09817 (7).EXE
Size
2.7MB
MD5
6ea2d6a0b14472eebb6fc8b8e9371973
SHA1
6ae943ca3e18abe3dfcbe9577bda115ebbd6eb59
SHA256
e9545300ebf4df13272cf826d5a82c79afeacf8a0fc64281bbe18c0687acd3da
SHA512
123972668a80821bf25683855d9f5f97f320615b114ad52b2ef06cb4669da1205ed9e3a996e6d77bd641397eaa69d0d63edb4bae1fa2b3282326a5b58b00986a
SSDEEP
49152:GCpIMZO2Z5O95AuDpDLyrGlSSYQDz/ncyRL7lYb4e/dfezWQPf19JIHGd/6vOrIZ:GCucgYuRyHSVDzHhhK4e/dfoFPf5IGxU
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
P:\Target\x86\ship\ses\x-none\opatchinst.pdb
GetTempFileNameA
CreateDirectoryA
LocalFree
CopyFileA
MoveFileA
GetFullPathNameA
MultiByteToWideChar
CreateThread
Sleep
CreateToolhelp32Snapshot
Process32First
Process32Next
ReadFile
ExpandEnvironmentStringsA
SetEvent
CreateEventA
SetFilePointer
WriteFile
GetTempPathW
GetTempFileNameW
CreateFileW
CreateProcessW
DeleteFileW
FindResourceA
LoadResource
LockResource
ExpandEnvironmentStringsW
GetSystemDefaultLangID
GetUserDefaultLangID
GetTempPathA
GlobalAlloc
GlobalFree
GetModuleHandleA
CompareStringA
GetWindowsDirectoryA
WritePrivateProfileStringA
SetLastError
GetModuleFileNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateProcessA
GetDiskFreeSpaceExA
GetCurrentProcess
DosDateTimeToFileTime
SetFileTime
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetProcessHeap
SetStdHandle
DeleteFileA
GetFileSize
CreateFileA
GetVersionExA
CloseHandle
GetExitCodeProcess
WaitForSingleObject
WideCharToMultiByte
LoadLibraryExA
GetModuleHandleW
GetProcAddress
FreeLibrary
DeleteCriticalSection
InitializeCriticalSectionEx
DecodePointer
RaiseException
FreeEnvironmentStringsW
VirtualQuery
VirtualProtect
GetLastError
GetSystemDirectoryA
GetFileAttributesW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetStdHandle
ExitProcess
GetACP
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
GetFileType
GetFileAttributesExW
GetStringTypeW
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
GetSystemInfo
VariantClear
SysFreeString
SysAllocString
VariantInit
VariantChangeType
EqualSid
RegCloseKey
RegOpenKeyExA
FreeSid
AllocateAndInitializeSid
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
ConvertStringSecurityDescriptorToSecurityDescriptorW
CoInitialize
CLSIDFromProgID
CoTaskMemFree
CoCreateInstance
CreateFontIndirectA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ