Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
914b1b3180e7ec1980d0bafe6fa36daade752bb26aec572399d2f59436eaa635.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
914b1b3180e7ec1980d0bafe6fa36daade752bb26aec572399d2f59436eaa635.exe
Resource
win10v2004-20240419-en
Target
60bec57db4f367e60c6961029d952fa6.bin
Size
154KB
MD5
e1d2acab9dfcedb3acae580a1ac91d0b
SHA1
0752796bfafcee8fb870f7ee822e04fece351c1e
SHA256
9e69d66d61c9d039d8c3a635c9b91c8fb775ed2dfde70c4cc7daafffa6323fb7
SHA512
315e6886439b8ea2cc342f2353e182595c3c31e3b64a1131eb44035dd8bb1b14d9fb2c2d6f7d7a1bffe52e7a6a4bb0021134e3165500bb3cea0efb5a81d99de2
SSDEEP
3072:oKe0PQqN71d0DBaJGh12D/SL8f84kUdoo3JgEmOUP7:PQqN7qwdbSLs0UdbgEmOy7
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\Tools\agent\workspace\MicroMsgWindowsV398\out\x64\Release\bin\WeChat.pdb
VerSetConditionMask
VerifyVersionInfoW
GetSystemDirectoryW
GetModuleHandleW
LoadLibraryExW
FindFirstFileW
FindNextFileW
GetCurrentProcess
GetShortPathNameW
TerminateProcess
GetModuleFileNameW
FindClose
LocalAlloc
GetFileAttributesW
GetPrivateProfileStringW
Sleep
GetLastError
GetProcAddress
LoadLibraryW
LocalFree
FreeLibrary
SetDllDirectoryW
LoadLibraryExA
VirtualQuery
VirtualProtect
WriteConsoleW
CreateFileW
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetSystemInfo
GetModuleHandleA
CloseHandle
GetVersionExW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCurrentThreadId
WaitForSingleObjectEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
QueryPerformanceCounter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
WriteFile
HeapFree
HeapAlloc
GetFileType
LCMapStringW
SetFilePointerEx
FindWindowW
MessageBoxW
GetSystemMetrics
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
SHGetSpecialFolderLocation
SHCreateDirectoryExW
SHGetPathFromIDListW
ShellExecuteW
CoTaskMemFree
PathFileExistsW
PathRemoveFileSpecW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ