Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
VirtualBox-6.1.34-150636-Win.exe
Resource
win10v2004-20230703-en
Target
VirtualBox-6.1.34-150636-Win.exe
Size
103.6MB
MD5
f49879e4146946e1cc5c7d5c93c6bc63
SHA1
aa05aaa4079bb2d17a1d055405888e44ef926909
SHA256
e84b0895fb0eede215a7d3b5ad2c92a2a3ed5cbc4eede2e2ee5c981eccb5f80e
SHA512
aff8489efa044082339df089222fe7e5127261ca5e54a9b529bf7108cf294e8b2daf956bdf8256181ca3bcc3cbc8c5de22d1e31d7ef732ef3326d53763d3e4e1
SSDEEP
1572864:iYWXZ6doNch5wt4aItxRFm3UmtVQ65iskjLatnNdqXXa43gEuydPHYXhfWmMGSwZ:iMVvrHmtmdjLgffEuAP4VWmMpxu7
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
NtOpenProcess
NtQueryInformationProcess
RtlFreeUnicodeString
NtOpenDirectoryObject
NtCreateFile
NtQueryVolumeInformationFile
NtQueryDirectoryObject
NtQueryDirectoryFile
NtQueryInformationFile
NtClose
GetCurrentProcessId
LocalAlloc
CompareStringW
SetEnvironmentVariableW
SetEnvironmentVariableA
ResetEvent
VirtualProtect
LockResource
LoadResource
SizeofResource
FindResourceExW
GetCurrentProcess
GetProcAddress
GetModuleHandleA
FreeLibrary
LocalFree
FormatMessageW
LoadLibraryExW
FreeConsole
AllocConsole
CloseHandle
GetLastError
CreateMutexA
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
Sleep
EncodePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapFree
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
LoadLibraryA
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
CreateFileA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
WriteConsoleW
MultiByteToWideChar
SetFilePointer
SetStdHandle
SetEndOfFile
GetProcessHeap
ReadFile
LCMapStringW
GetStringTypeW
CreateFileW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFileAttributesW
CreateDirectoryW
RemoveDirectoryW
DeviceIoControl
GetFileSize
DeleteFileW
GetFileAttributesW
GetFullPathNameW
MoveFileExW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetCommandLineW
GetVersionExW
SetErrorMode
GetSystemDirectoryW
CreateEventA
SetEvent
WaitForSingleObjectEx
RaiseException
OutputDebugStringA
GetVersion
ASMAtomicCmpXchgU8
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ