Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
ee1e8adccdca532b29f048880f43813c771d7a9f3d812e25a53e09fbe57f6aea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ee1e8adccdca532b29f048880f43813c771d7a9f3d812e25a53e09fbe57f6aea.exe
Resource
win10v2004-20240412-en
Target
ee1e8adccdca532b29f048880f43813c771d7a9f3d812e25a53e09fbe57f6aea
Size
1.1MB
MD5
14c7da2d46990370cf08de862fa384dd
SHA1
cd46507c89b04549f143313ff73c61b532e049d5
SHA256
ee1e8adccdca532b29f048880f43813c771d7a9f3d812e25a53e09fbe57f6aea
SHA512
a8d4883dc239c987f950550e2001ec9c2e33171ba7d7cd72e5e48390c6013dfc4193fc6c4533dd4796f326e06792a935b64cac6c32723eb7ff8f8e2729daba0e
SSDEEP
12288:Jq+e48dJWBKlUgF1J0stz9o4D1DeDecOMehHgSDv0e9+nK+kOFHZz:Jqh4AXlU61JTw4DteDNehK5z
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\_work\wechat-windows-sub\Release\WechatBrowser.pdb
SetHandleInformation
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
UnregisterWaitEx
AssignProcessToJobObject
WriteProcessMemory
CreateFileMappingW
MapViewOfFile
GetCurrentProcessorNumber
SetThreadAffinityMask
VirtualFree
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
ExpandEnvironmentStringsW
GetFileAttributesW
QueryDosDeviceW
GetLongPathNameW
CreateFileW
VirtualProtectEx
VirtualFreeEx
ReadProcessMemory
GetCurrentDirectoryW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
LoadLibraryExW
FreeLibrary
GetModuleHandleExW
ReleaseSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
QueryThreadCycleTime
CreateNamedPipeW
CreateProcessW
CreateRemoteThread
CreateJobObjectW
HeapCreate
CreateMutexW
UnmapViewOfFile
GetCommandLineW
ReadFile
SetCurrentDirectoryW
TlsGetValue
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
GetProcessTimes
SearchPathW
lstrlenW
DebugBreak
GetFileType
HeapFree
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
FlushFileBuffers
FindClose
FindNextFileW
FindFirstFileExW
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
TlsAlloc
TlsFree
TlsSetValue
VirtualQuery
WideCharToMultiByte
K32QueryWorkingSetEx
SetEnvironmentVariableW
SwitchToThread
InitOnceExecuteOnce
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStdHandle
SetStdHandle
ExitProcess
GetConsoleMode
GetConsoleOutputCP
RtlUnwind
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
GetCPInfo
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetThreadPriority
SetThreadPriority
GetThreadId
CloseHandle
RaiseException
GetModuleHandleW
IsDebuggerPresent
Sleep
ProcessIdToSessionId
GetCurrentProcessId
LocalFree
IsWow64Process
GetNativeSystemInfo
GetProductInfo
GetVersionExW
GetTickCount
HeapDestroy
EnumSystemLocalesEx
GetUserDefaultLocaleName
GetUserDefaultLCID
GetUserDefaultLangID
TerminateProcess
GetCurrentThreadId
SetInformationJobObject
DuplicateHandle
WaitForSingleObject
PostQueuedCompletionStatus
TerminateJobObject
RegisterWaitForSingleObject
UnregisterWait
SetEvent
GetQueuedCompletionStatus
ResetEvent
SetLastError
CreateThread
CreateEventW
CreateIoCompletionPort
VirtualAllocEx
VirtualQueryEx
GetCurrentThread
GetCurrentProcess
SetProcessDEPPolicy
HeapSetInformation
GetLastError
GetModuleHandleA
GetProcAddress
LoadLibraryW
HeapAlloc
GetModuleFileNameW
GetStringTypeW
LCMapStringEx
MultiByteToWideChar
DecodePointer
EncodePointer
InitializeCriticalSectionEx
WriteConsoleW
CreateDesktopW
SetProcessWindowStation
CreateWindowStationW
GetProcessWindowStation
CloseDesktop
CloseWindowStation
GetThreadDesktop
GetUserObjectInformationW
EventWriteTransfer
EventUnregister
EventRegister
SetEntriesInAclW
GetSecurityInfo
GetSidSubAuthority
InitializeSid
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
DuplicateToken
CreateRestrictedToken
RegQueryValueExW
RegCreateKeyExW
SetThreadToken
GetTokenInformation
CreateProcessAsUserW
AccessCheck
EqualSid
IsValidSid
GetNamedSecurityInfoW
MapGenericMask
ImpersonateLoggedOnUser
FreeSid
SystemFunction036
ConvertSidToStringSidW
DuplicateTokenEx
GetKernelObjectSecurity
SetKernelObjectSecurity
GetAce
OpenProcessToken
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegOpenKeyExW
RegDisablePredefinedCache
RevertToSelf
CoTaskMemFree
PathRemoveFileSpecW
PathAppendW
timeGetTime
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE