Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
vboxwrapper_2020022402_windows_x86_64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
vboxwrapper_2020022402_windows_x86_64.exe
Resource
win10v2004-20230220-en
Target
vboxwrapper_2020022402_windows_x86_64.exe
Size
2.3MB
MD5
a6a9a40db137af1fb3e3d531d63e6151
SHA1
ee763b198443366880a6155524d1e0e1bb4adde4
SHA256
6268c8b44d1928a6d46f57250e7fcf653e4ad5e48c90358548b62b7709c92add
SHA512
91d43a247d447c1380addb7e1c1581d22e4e67fec78fd2e8dc549d02d8872128c15b9d796c1e8709e3003d6627f86c9f58dd746ba7600548ac8ee5a6fe0b780e
SSDEEP
49152:sfM/ogpD8MxHpEjJnNn0eLeb0D3klSFIsQh8N3Sp2kyb6MBaitz1PqK68Db:sc2jRNn0N43RnSp2kyb6MBaitz1Pqo
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
SetPriorityClass
MultiByteToWideChar
WideCharToMultiByte
GetProcessTimes
GetCurrentThread
GetThreadTimes
GetSystemTimeAsFileTime
CreateMutexA
GetModuleFileNameA
CreateFileA
GetFileSizeEx
SetEndOfFile
SetFilePointerEx
FindClose
GetTempFileNameA
GetDiskFreeSpaceExA
CreateDirectoryA
RemoveDirectoryA
GetFileAttributesA
DeleteFileA
FindFirstFileA
FindNextFileA
CopyFileA
MoveFileExA
LocalFree
FormatMessageW
ExpandEnvironmentStringsA
SetCurrentDirectoryA
SetUnhandledExceptionFilter
GetCurrentThreadId
GetProcAddress
GetModuleHandleA
GetVersionExA
GetCurrentProcess
OpenThread
GetThreadContext
SuspendThread
IsDebuggerPresent
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
ReleaseMutex
WaitForMultipleObjects
DuplicateHandle
MapViewOfFile
UnmapViewOfFile
CreateEventA
CreateFileMappingA
OutputDebugStringA
FreeLibrary
SetLastError
LoadLibraryA
GetEnvironmentVariableA
GetCurrentDirectoryA
GetVersion
GetStdHandle
SetFilePointer
GetFileTime
SetFileTime
GetLocalTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
FileTimeToSystemTime
DosDateTimeToFileTime
GetDriveTypeA
GetFullPathNameA
SetFileAttributesA
SetVolumeLabelA
GetVolumeInformationA
GetLocaleInfoA
GetConsoleMode
GetConsoleScreenBufferInfo
SetConsoleMode
GetFileType
SetFileAttributesW
SetEnvironmentVariableA
lstrcmpiA
lstrcpynA
lstrlenA
CreateThread
SetThreadPriority
ResumeThread
EncodePointer
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetDriveTypeW
GetCommandLineA
IsProcessorFeaturePresent
ExitThread
LoadLibraryExW
SetConsoleCtrlHandler
GetCPInfo
SetStdHandle
GetFileInformationByHandle
FlushFileBuffers
WriteFile
GetConsoleCP
FatalAppExitA
GetStartupInfoW
IsValidCodePage
GetACP
GetOEMCP
GetTimeZoneInformation
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
GetModuleFileNameW
FindFirstFileExW
SystemTimeToTzSpecificLocalTime
SetCurrentDirectoryW
GetCurrentDirectoryW
ReadConsoleW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
GetStringTypeW
MoveFileExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WriteConsoleW
OutputDebugStringW
GetFullPathNameW
GetFileAttributesExW
lstrlenW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RemoveDirectoryW
CreateDirectoryW
SetEnvironmentVariableW
DeleteFileW
OpenFileMappingA
LocalAlloc
Thread32Next
Thread32First
CreateToolhelp32Snapshot
DebugBreak
RaiseException
GetProcessWorkingSetSize
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DecodePointer
PeekNamedPipe
CreatePipe
SetHandleInformation
ReadFile
Sleep
WaitForSingleObject
TerminateProcess
OpenProcess
CreateProcessA
CloseHandle
GetLastError
GetExitCodeProcess
GetFileAttributesW
GetCurrentProcessId
UnregisterClassA
CharToOemA
OemToCharA
GetClassNameA
GetWindowTextA
GetForegroundWindow
GetWindowThreadProcessId
OleRun
CoCreateInstance
CoInitialize
htons
ioctlsocket
htonl
ntohs
socket
gethostbyname
WSACleanup
WSAGetLastError
getsockopt
getsockname
inet_ntoa
closesocket
bind
WSAStartup
ntohl
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CryptReleaseContext
CryptGenRandom
GetKernelObjectSecurity
OpenProcessToken
AdjustTokenPrivileges
IsValidSid
IsValidAcl
IsValidSecurityDescriptor
GetSecurityDescriptorControl
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
SetKernelObjectSecurity
LookupPrivilegeValueA
GetSecurityDescriptorLength
AllocateAndInitializeSid
FreeSid
CryptAcquireContextA
SHGetFolderPathA
CreateErrorInfo
SetErrorInfo
VariantChangeType
VariantClear
VariantInit
GetErrorInfo
SafeArrayGetVartype
SafeArrayUnlock
SafeArrayLock
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayDestroy
SysAllocStringByteLen
SysStringByteLen
SysFreeString
SysAllocStringLen
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ