Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ad92d85b2805d37bb4519262748ecb10N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad92d85b2805d37bb4519262748ecb10N.exe
Resource
win10v2004-20240802-en
Target
ad92d85b2805d37bb4519262748ecb10N.exe
Size
404KB
MD5
ad92d85b2805d37bb4519262748ecb10
SHA1
9b879484a13349b45f0e7e989653b3e1ee0e5a57
SHA256
2ced712381fb90de50b3cf596de7b469c62b5fd48c74d242ca942c788619cbf4
SHA512
25da94d457059480bd9bd0f8bf3c82c4dd41922de85aaa5e5ce4a11289bc4451ce4b5d575f5a9de0a1a0b2fbc85d636316a33d425044cc8d8c7812de7c30a727
SSDEEP
6144:tTz3+tpsdRHgObbs9xf+ORIRUJlUJMTs5jNQfGL8HzyhBBYoRabGb:x3+tqOObGAORIRUJ2JMA5jmrHgBBb
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\a\Sandboxie\Sandboxie\Sandboxie\Bin\x64\SbieRelease\SbieSvc.pdb
SbieApi_EnumProcessEx
SbieApi_QueryProcessPath
SbieApi_QueryProcessInfo
SbieApi_QueryProcessEx2
SbieApi_GetMessage
SbieApi_GetVersionEx
SbieApi_Call
SbieDll_RunSandboxed
SbieApi_IsBoxEnabled
SbieDll_IsOpenClsid
SbieDll_ComCreateStub
SbieDll_RunFromHome
SbieApi_QueryConfBool
SbieApi_SetUserName
SbieApi_GetUnmountHive
SbieDll_RunStartExe
SbieDll_TranslateNtToDosPath
SbieApi_QueryProcess
SbieDll_FormatMessage2
SbieDll_PortName
SbieDll_InjectLow_InitHelper
SbieDll_InjectLow_InitSyscalls
SbieDll_InjectLow
SbieDll_GetStringForStringList
SbieDll_GetStringsForStringList
SbieApi_GetHomePath
SbieApi_QueryPathList
SbieApi_QueryConfNumber
SbieApi_QueryConfNumber64
SbieDll_KillOne
SbieDll_FreeMem
SbieDll_QueueCreate
SbieDll_QueueGetReq
SbieDll_QueuePutRpl
SbieApi_CheckInternetAccess
SbieDll_GetSettingsForName_bool
SbieDll_DisableCHPE
SbieApi_LogMsgExt
SbieDll_GetPublicSD
SbieApi_EnumBoxesEx
SbieDll_CheckStringInList
SbieDll_CheckPatternInList
SbieApi_SessionLeader
SbieApi_ReloadConf
SbieDll_FindArgumentEnd
SbieApi_OpenProcess
SbieDll_GetLanguage
SbieDll_FormatMessage0
SbieApi_QueryConf
SbieDll_GetServiceRegistryValue
SbieApi_LogEx
SbieApi_Log
NtSetInformationFile
NtReadFile
NtWriteFile
NtCreateFile
NtQueryKey
RtlSetDaclSecurityDescriptor
RtlCreateVirtualAccountSid
NtLoadDriver
RtlInitUnicodeString
NtReplyWaitReceivePort
NtRequestPort
NtCreatePort
NtUnloadKey
NtOpenKey
NtClose
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlPcToFileHeader
RtlUnwindEx
NtDuplicateObject
NtOpenProcess
NtResumeProcess
NtSuspendProcess
NtGetNextThread
NtAdjustPrivilegesToken
NtReadVirtualMemory
NtQueryInformationThread
NtSetInformationProcess
NtOpenDirectoryObject
NtImpersonateClientOfPort
NtCompleteConnectPort
NtAcceptConnectPort
NtRequestWaitReplyPort
NtConnectPort
RtlNtStatusToDosError
NtOpenFile
NtDeleteFile
NtQueryObject
NtFilterToken
NtDuplicateToken
NtQueryInformationToken
NtOpenThreadToken
NtOpenProcessToken
NtSetInformationThread
NtAllocateVirtualMemory
RtlInitializeSid
RtlSubAuthoritySid
NtSetInformationToken
NtQueryInformationProcess
RtlCreateSecurityDescriptor
NtLoadKey
NtQuerySystemInformation
FlsSetValue
FlsGetValue
FlsAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
GetStringTypeW
GetStdHandle
GetModuleHandleExW
LoadLibraryExW
FreeLibrary
TlsFree
EncodePointer
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
CloseHandle
GetLastError
HeapCreate
HeapAlloc
HeapFree
GetProcessHeap
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
SetEvent
WaitForSingleObject
CreateMutexW
OpenMutexW
CreateEventW
OpenEventW
Sleep
WaitForMultipleObjects
ExitProcess
TerminateProcess
CreateThread
GetCurrentThread
GetTickCount
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
LocalFree
GetEnvironmentVariableW
SetCurrentDirectoryW
GetFullPathNameW
GetPrivateProfileStringW
CreateFileW
SetFilePointer
WriteFile
SetLastError
DeviceIoControl
GetProcessTimes
GetCurrentProcess
GetCurrentProcessId
SetThreadPriority
TerminateThread
OpenProcess
GetLocalTime
GetVersionExW
VirtualAlloc
VirtualFree
LocalAlloc
GetSystemWindowsDirectoryW
DuplicateHandle
ResetEvent
QueueUserAPC
GetCurrentThreadId
OpenThread
ProcessIdToSessionId
IsProcessInJob
CreateJobObjectW
AssignProcessToJobObject
TerminateJobObject
SetInformationJobObject
QueryInformationJobObject
GetModuleHandleW
GetProcAddress
LoadLibraryW
GlobalSize
RegisterWaitForSingleObject
UnregisterWait
AllocConsole
GetConsoleWindow
GetConsoleProcessList
GetFileSizeEx
OutputDebugStringW
RaiseException
InitializeCriticalSectionAndSpinCount
GetCommandLineW
GetSystemInfo
GetFinalPathNameByHandleW
DefineDosDeviceW
GetLogicalDrives
GetCompressedFileSizeW
GetExitCodeProcess
CreateProcessW
CancelIo
TlsAlloc
TlsGetValue
TlsSetValue
SuspendThread
ResumeThread
WriteProcessMemory
IsWow64Process
GetModuleFileNameW
QueryFullProcessImageNameW
QueueUserWorkItem
DeleteFileW
GetFileAttributesW
ReadFile
SetEndOfFile
SetFileAttributesW
GetWindowsDirectoryW
CopyFileW
MultiByteToWideChar
WideCharToMultiByte
ReadProcessMemory
MulDiv
LCMapStringW
SetStdHandle
SetFilePointerEx
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
WriteConsoleW
FlsFree
DeleteCriticalSection
EndPaint
SendMessageTimeoutW
SendMessageW
SendMessageA
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
BeginPaint
CreateDesktopW
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
SetTimer
DispatchMessageW
GetMessageW
wsprintfW
ShowWindow
RegisterClassExW
GetMonitorInfoW
PackDDElParam
GetRawInputDeviceInfoW
GetRawInputDeviceInfoA
UserHandleGrantAccess
GetWindowInfo
MonitorFromWindow
ChangeDisplaySettingsExW
ChangeDisplaySettingsExA
GetIconInfo
GetWindow
GetWindowThreadProcessId
GetClassNameW
GetClassNameA
EnumThreadWindows
EnumWindows
GetShellWindow
FindWindowExW
FindWindowExA
FindWindowW
FindWindowA
EnumChildWindows
GetParent
GetDesktopWindow
GetClassLongPtrW
GetClassLongPtrA
GetClassLongW
GetClassLongA
GetWindowLongPtrW
GetWindowLongPtrA
GetWindowLongW
GetWindowLongA
ClipCursor
MapWindowPoints
ScreenToClient
ClientToScreen
SetCursorPos
GetWindowRect
GetClientRect
GetPropW
GetPropA
SetPropW
ReleaseDC
GetDC
SetForegroundWindow
IsWindowEnabled
IsWindowUnicode
KillTimer
EnumClipboardFormats
GetClipboardData
GetClipboardSequenceNumber
IsZoomed
IsIconic
IsWindowVisible
SetWindowPos
DestroyWindow
IsWindow
CreateWindowExW
RegisterClassW
DefWindowProcW
PostMessageW
PostMessageA
SendNotifyMessageW
SetThreadDesktop
SendNotifyMessageA
CreateProcessAsUserW
OpenSCManagerW
CloseServiceHandle
LsaManageSidNameMapping
LsaFreeMemory
LookupAccountNameW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertStringSidToSidW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
LookupPrivilegeValueW
LookupAccountSidW
GetTokenInformation
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
GetSecurityInfo
AccessCheck
QueryServiceConfig2W
QueryServiceConfigW
EnumServicesStatusW
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
GetLengthSid
EqualSid
DuplicateToken
AddAccessAllowedAce
SetThreadToken
RevertToSelf
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerExW
ReportEventW
OpenEventLogW
StartServiceW
EnumServicesStatusExW
ControlService
SetSecurityInfo
SetTokenInformation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetSecurityDescriptorSacl
RegOpenCurrentUser
RegOpenUserClassesRoot
QueryServiceStatusEx
DuplicateTokenEx
OpenServiceW
GetModuleBaseNameW
GetProcessMemoryInfo
GetModuleFileNameExW
EnumProcessModules
CoInitializeEx
CoGetClassObject
CoMarshalInterface
CoUnmarshalInterface
CoInitializeSecurity
CoQueryProxyBlanket
CoSetProxyBlanket
CreateStreamOnHGlobal
StringFromGUID2
CoTaskMemFree
CoGetObject
CoRegisterClassObject
CoRevokeClassObject
CoInitialize
CoCopyProxy
CryptUnprotectData
CryptProtectData
CreateEnvironmentBlock
DestroyEnvironmentBlock
CreateSolidBrush
SelectObject
TextOutW
SetTextColor
SetBkColor
CreateFontW
GetDeviceCaps
GetMetaFileBitsEx
GetDIBits
DeleteDC
CreateCompatibleDC
GetEnhMetaFileBits
NetUseAdd
WTSQueryUserToken
UuidFromStringW
RpcStringFreeW
RpcBindingToStringBindingW
RpcMgmtEpEltInqNextW
RpcMgmtEpEltInqBegin
RpcMgmtEpEltInqDone
BCryptCreateHash
BCryptVerifySignature
BCryptHashData
BCryptImportKeyPair
BCryptCloseAlgorithmProvider
BCryptGetProperty
BCryptOpenAlgorithmProvider
BCryptFinishHash
BCryptDestroyHash
BCryptDestroyKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ