Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
install.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
install.exe
Resource
win10v2004-20240802-en
Target
install.exe
Size
460KB
MD5
60bec57db4f367e60c6961029d952fa6
SHA1
6f67f37bc101c3243404a4de5d2561b47fd9e1c3
SHA256
914b1b3180e7ec1980d0bafe6fa36daade752bb26aec572399d2f59436eaa635
SHA512
150b4be7a3ca8bfdbc111c64cf036246bb00a623fdc09baa102b92aa4f0023dd3045c5fd16a6a458d9250bd9bdbcf61cdee3cc0f7927b8be2cf42649daa308d7
SSDEEP
12288:3nt5E565kzLGnAj9AL4SO/Ud0mu+bPGH4:3n4sAJlMbg4
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\Tools\agent\workspace\MicroMsgWindowsV398\out\x64\Release\bin\WeChat.pdb
VerSetConditionMask
VerifyVersionInfoW
GetSystemDirectoryW
GetModuleHandleW
LoadLibraryExW
FindFirstFileW
FindNextFileW
GetCurrentProcess
GetShortPathNameW
TerminateProcess
GetModuleFileNameW
FindClose
LocalAlloc
GetFileAttributesW
GetPrivateProfileStringW
Sleep
GetLastError
GetProcAddress
LoadLibraryW
LocalFree
FreeLibrary
SetDllDirectoryW
LoadLibraryExA
VirtualQuery
VirtualProtect
WriteConsoleW
CreateFileW
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetSystemInfo
GetModuleHandleA
CloseHandle
GetVersionExW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCurrentThreadId
WaitForSingleObjectEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
QueryPerformanceCounter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
WriteFile
HeapFree
HeapAlloc
GetFileType
LCMapStringW
SetFilePointerEx
FindWindowW
MessageBoxW
GetSystemMetrics
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
SHGetSpecialFolderLocation
SHCreateDirectoryExW
SHGetPathFromIDListW
ShellExecuteW
CoTaskMemFree
PathFileExistsW
PathRemoveFileSpecW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ