Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
VirtualBox-7.0.18-162988-Win.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
VirtualBox-7.0.18-162988-Win.exe
Resource
win10v2004-20240426-en
Target
VirtualBox-7.0.18-162988-Win.exe
Size
104.6MB
MD5
6a046a57ca3dd222d8bf1410b8172f81
SHA1
49888a74780ac09ab6ec99bbcca5950890e5a227
SHA256
4c83894c00aa9f55f7e0f70807210896ba32e1222d4ff1d0b9487af81f328f36
SHA512
cb19129d62253bde686618cba40449ed05d5435ae11dbbb83ebc9a1b308fc7e9387cb964cb4cf26e91d7e38b9e8b75ebcb5de8039379986bf95cc77456a65a4b
SSDEEP
3145728:aTdp/Gww7IEwmuQYIuSwHn9B4mzL8M6Wfwf:aFw70RQYIfwM6Q7+wf
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
D:\tinderboxa\win-7.0\out\win.amd64\release\obj\VBoxStub\VBoxStub.pdb
NtQueryInformationProcess
NtOpenProcess
NtProtectVirtualMemory
NtSetEvent
NtResetEvent
NtCreateEvent
NtWaitForSingleObject
NtTerminateProcess
RtlFreeUnicodeString
NtQueryDirectoryFile
RtlGetNtProductType
NtOpenDirectoryObject
NtCreateFile
NtQueryDirectoryObject
NtQueryVolumeInformationFile
NtClose
NtQueryInformationFile
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
SystemTimeToFileTime
GetTickCount
GetSystemTime
OutputDebugStringA
GetCommandLineW
TlsSetValue
TlsGetValue
CloseHandle
GetLastError
SetLastError
CreateMutexW
GetCurrentProcess
FindResourceExW
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryExW
LoadResource
LockResource
SizeofResource
LocalFree
FormatMessageW
AllocConsole
FreeConsole
HeapAlloc
HeapReAlloc
HeapFree
GetProcessHeap
CreateDirectoryW
RemoveDirectoryW
SetFileAttributesW
GetStdHandle
CreateFileW
DeleteFileW
FlushFileBuffers
GetFileSize
GetFileType
ReadFile
SetEndOfFile
SetFilePointer
LoadLibraryExA
WriteFile
DeviceIoControl
GetCurrentProcessId
GetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetFileAttributesW
GetFullPathNameW
MoveFileExW
GetConsoleMode
Sleep
GetCurrentThreadId
TerminateProcess
SetErrorMode
GetVersion
GetModuleHandleW
GetModuleFileNameW
WideCharToMultiByte
GetACP
GetSystemDirectoryW
RaiseException
GetCurrentThread
TlsAlloc
nocrt_memchr
nocrt_memcmp
nocrt_memcpy
nocrt_memmove
nocrt_memrchr
nocrt_memset
nocrt_strchr
nocrt_strcmp
nocrt_strcpy
nocrt_strlen
nocrt_strncmp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ