Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
Start.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Start.exe
Resource
win10v2004-20230831-en
Target
Start.exe
Size
456KB
MD5
552b77913d6c90595e9c4d97e38ccf78
SHA1
f26f738300206a19aa03cf8002cbd05dbd8d8fd7
SHA256
9d45b2d1dfbadb2297ab551084edc1ef31f14f058ca894ea1b7ce4f77a36bfb3
SHA512
f04e9e58dabee309364cd11e28fa8949613258a02fb668eb528f1023f68c0d5595da150b9b3cb1b713a06085eada5e4cdedbfdb6b3860aa634e1bc17a7f7dbb4
SSDEEP
6144:UwXaUhoveNAlh/MUAirc+G5xgT/AXTw/ohz28R7spOswaATH:UwXaUhoWo+iEwod7+U/
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RtlVirtualUnwind
RtlCaptureContext
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
NtTerminateThread
NtTerminateProcess
NtOpenKey
RtlNtStatusToDosError
RtlInitUnicodeString
NtSetInformationFile
NtQueryInformationFile
NtCreateFile
NtClose
RegisterClassW
CreateMenu
CreatePopupMenu
DestroyMenu
GetMenuItemCount
TrackPopupMenu
GetMenuInfo
SetMenuInfo
InsertMenuItemW
GetDC
DestroyIcon
DrawIconEx
IsWindowEnabled
GetWindowTextW
MapWindowPoints
GetWindowLongW
SetWindowLongW
GetMessageW
PostThreadMessageW
GetAsyncKeyState
AllowSetForegroundWindow
DefWindowProcW
DestroyWindow
SendDlgItemMessageW
SetFocus
EnableWindow
GetSystemMetrics
ExitWindowsEx
SetPropW
GetPropW
MessageBoxW
wsprintfW
ClientToScreen
GetWindowLongPtrW
SetWindowLongPtrW
GetSysColorBrush
CreateWindowExW
CallWindowProcW
LoadImageW
GetDesktopWindow
ScreenToClient
GetWindowRect
GetClientRect
SetWindowTextW
SetForegroundWindow
SendMessageW
ShowWindow
MoveWindow
SetWindowPos
DialogBoxParamW
DialogBoxIndirectParamW
KillTimer
SetTimer
SetDlgItemTextW
GetDlgItem
EndDialog
ShellExecuteExW
ExtractAssociatedIconW
ExtractIconW
ExtractIconExW
SHGetSpecialFolderPathW
ShellExecuteW
SHBindToParent
SHGetFolderPathW
SHAutoComplete
PathFileExistsW
AssocQueryStringW
StrStrIW
InitializeCriticalSection
OutputDebugStringA
SetConsoleTextAttribute
GetConsoleScreenBufferInfo
DecodePointer
GlobalFree
GetWindowsDirectoryA
GlobalUnlock
GlobalAlloc
FindResourceW
SizeofResource
LockResource
LoadResource
GetComputerNameA
QueryPerformanceCounter
InitializeSListHead
DuplicateHandle
GetTimeZoneInformation
SetEndOfFile
GetEnvironmentStringsW
FreeEnvironmentStringsW
DeleteFileW
GetTempPathA
CreatePipe
FindFirstFileExW
GlobalLock
TlsAlloc
WriteConsoleW
HeapSize
OutputDebugStringW
ReadConsoleW
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleOutputCP
SetStdHandle
GetStringTypeW
SetFilePointerEx
GetFileSizeEx
GetOEMCP
GetACP
IsValidCodePage
WideCharToMultiByte
GetCPInfo
MultiByteToWideChar
GetModuleHandleExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetFileType
GetFileAttributesExW
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
HeapAlloc
HeapFree
GetProcessHeap
GetTickCount
GetModuleHandleW
LocalFree
GetCurrentProcessId
GetStartupInfoW
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
RemoveDirectoryW
CloseHandle
SetLastError
HeapCreate
HeapDestroy
WaitForSingleObject
CreateEventW
Sleep
ExitProcess
GetExitCodeProcess
CreateThread
CreateProcessW
ProcessIdToSessionId
GetSystemTimeAsFileTime
GetModuleFileNameW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetFileAttributesW
GetFullPathNameW
GetSystemWindowsDirectoryW
CreateFileW
GetLogicalDrives
HeapReAlloc
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
GetStdHandle
GetCommandLineW
SetCurrentDirectoryW
GetCurrentDirectoryW
WriteFile
GetLastError
GetCurrentThreadId
GetVersionExW
GetProcAddress
LoadLibraryW
FormatMessageW
RaiseException
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsGetValue
GetCommandLineA
PatBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
SbieApi_EnumBoxesEx
File_GetName
Key_GetName
SbieDll_StartCOM
SbieDll_CallServer
SbieDll_RunOutofSandboxed
SbieDll_RunSandboxed
SbieDll_FormatMessage
SbieDll_GetTokenElevationType
SbieDll_KillAll
SbieDll_GetLanguage
SbieDll_GetStartError
SbieDll_StartSbieSvc
SbieDll_RunStartExe
SbieDll_GetSysFunction
SbieApi_IsBoxEnabled
SbieApi_ReloadConf
SbieApi_DisableForceProcess
SbieDll_InitPStore
SbieApi_QueryProcessInfo
SbieDll_GetHandlePath
SbieDll_IsDirectory
SbieDll_IsReservedFileName
SbieDll_TranslateNtToDosPath
SbieApi_EnumBoxes
SbieApi_EnumProcessEx
SbieApi_QueryBoxPath
SbieApi_QueryConf
SbieApi_QueryProcess
SbieDll_FreeMem
SbieDll_CallServerQueue
SbieDll_FormatMessage1
SbieDll_FormatMessage0
SbieApi_QueryConfBool
SbieApi_Call
SbieApi_GetHomePath
CoTaskMemFree
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
RegEnumValueW
InitCommonControlsEx
GetOpenFileNameW
GdipDisposeImage
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStream
GdiplusStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ