Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.89ee2c0c2109db167bcf539b32d75f90.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.89ee2c0c2109db167bcf539b32d75f90.exe
Resource
win10v2004-20230915-en
Target
NEAS.89ee2c0c2109db167bcf539b32d75f90.exe
Size
93KB
MD5
89ee2c0c2109db167bcf539b32d75f90
SHA1
bd4db6ac63635d1589521477090a9ced6253e2bd
SHA256
d832ae2c1bc28a0ed7c4abe9c9bac31c8bd1ac8f87eb234452ca1d06c0885275
SHA512
0432aebda285ad536b0d1229c3509e5f7d18519f72ad7dc94027428edc4bff0367595e1056714311f10445216554d792973a21e80ba0421f1c5e6093d189ae86
SSDEEP
1536:3Y6THg7UsoXoHgnx06hRT7BpJLmnj5KU0s56VKdcyXMHN9TTRuSXjx:I6rgwoHayO0njw1Q2rN9TTRuS
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
OurStrcpy
CreateErrorRecord_D
tracelog_D
Show_Module_Stats_D
Show_Header_D
open_log_file_D
get_edmenv_log_D
close_log_file_D
Edm_Object_Delete_D
Edm_Heap_Set_D
Edm_Vars_Exit_D
Edm_Find_Pool_D
v_set_D
v_get_string_D
v_get_D
var_cpy_D
SynchronizesObjectsFromDisk_D
pooltab_replace_D
pooltab_delete_D
pooltab_add_D
VerifyVarsDLL
OurStricmp
OurStrupr
OurStrnicmp
OurUpcase
OurStrstr
OurStrrchr
OurStrncpy
OurTrim
OurSplitpath
ord201
ord177
ord196
ord176
GetACP
HeapSize
FlushFileBuffers
SetStdHandle
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
SetFilePointer
GetStringTypeW
WideCharToMultiByte
GetStringTypeA
GetCurrentDirectoryA
GetFullPathNameA
GetOEMCP
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetCommandLineA
GetStartupInfoA
FindFirstFileA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
DeleteFileA
MoveFileA
GetCurrentProcess
TerminateProcess
GetModuleHandleA
ExitProcess
HeapFree
HeapAlloc
GetCPInfo
LCMapStringA
LCMapStringW
GetTimeZoneInformation
VirtualProtect
GetSystemInfo
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
GetLocaleInfoA
CreateFileW
ReadFile
SetEnvironmentVariableA
LoadLibraryA
GetProcAddress
MultiByteToWideChar
GetVolumeInformationA
GetLastError
LocalAlloc
LocalFree
CreateFileA
CloseHandle
GetCurrentProcessId
lstrcpyA
GetFileAttributesA
SetFileAttributesA
InterlockedExchange
SetEndOfFile
CompareStringA
CompareStringW
RtlUnwind
LoadIconA
LoadCursorA
RegisterClassA
PostQuitMessage
DefWindowProcA
CreateWindowExA
ShowWindow
GetStockObject
GetLengthSid
GetUserNameA
SetFileSecurityA
SetSecurityDescriptorDacl
AddAce
GetAce
InitializeAcl
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
AllocateAndInitializeSid
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ