Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d8dbc6bb8ea9631a970f5c0552908c30.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.d8dbc6bb8ea9631a970f5c0552908c30.exe
Resource
win10v2004-20230915-en
Target
NEAS.d8dbc6bb8ea9631a970f5c0552908c30.exe
Size
545KB
MD5
d8dbc6bb8ea9631a970f5c0552908c30
SHA1
c843c3138b7aec68053999e82d03abe35a4cda81
SHA256
076376e8adc74f47fc83fe302d4974cf4ecf1d204771a43f7485608273c4084c
SHA512
7fd26080a0c3dc1205ae5dccc16afc5bf2c04ce44a29a5c85898b77e9da12daa35701dda68284296d8354a65707024e8f7949919399aa27190e863c87e14ab69
SSDEEP
12288:j7YkTkZJwR51xykyN3fXQ21/OZwkkmFy0i6VbsLkt:j7YkTkIxC1OZwOy16VoLy
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetVersionExW
GetProcAddress
GetSystemInfo
GlobalMemoryStatusEx
GetLogicalDriveStringsW
VirtualAlloc
GetDriveTypeW
GetDiskFreeSpaceExW
VirtualFree
InterlockedDecrement
SetFilePointer
CreateFileMappingW
MapViewOfFile
WriteFile
UnmapViewOfFile
SystemTimeToFileTime
GetTickCount
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcess
WTSGetActiveConsoleSessionId
OpenProcess
GetLocalTime
lstrlenA
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetModuleHandleW
DeleteFileW
CopyFileW
GetTempFileNameW
GetTempPathW
ReadFile
MultiByteToWideChar
WinExec
GetPrivateProfileIntW
GetFileSize
CreateFileW
GetPrivateProfileStringW
FindNextFileW
FindFirstFileW
GetLastError
VerifyVersionInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
VerSetConditionMask
WideCharToMultiByte
FindClose
CloseHandle
SetStdHandle
CreateFileA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetConsoleMode
GetConsoleCP
LCMapStringA
QueryPerformanceCounter
GetModuleFileNameW
Process32NextW
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LoadLibraryA
GetStdHandle
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetSystemTimeAsFileTime
InterlockedCompareExchange
InterlockedExchange
Sleep
OpenFileMappingW
InterlockedIncrement
GetPrivateProfileSectionNamesW
WritePrivateProfileStringW
GetPrivateProfileSectionW
CreateMutexW
CreateDirectoryW
DeviceIoControl
GetCurrentProcessId
SetLastError
ProcessIdToSessionId
DebugBreak
VirtualProtect
GetVersion
IsBadCodePtr
IsBadReadPtr
GetModuleHandleExW
ExitThread
GetCommandLineW
GetWindowsDirectoryW
FormatMessageW
GetModuleHandleA
FlushInstructionCache
CreateFileMappingA
LocalFree
LocalAlloc
GetFileSizeEx
CreateProcessW
WaitForSingleObject
ReadProcessMemory
VirtualQueryEx
InitializeCriticalSectionAndSpinCount
HeapCreate
CreateEventW
AddVectoredExceptionHandler
SetUnhandledExceptionFilter
RemoveVectoredExceptionHandler
GetCurrentThreadId
TerminateProcess
VirtualQuery
GetModuleFileNameA
ReleaseMutex
LoadLibraryW
lstrcatA
GetThreadContext
OpenMutexW
DuplicateHandle
OpenEventW
lstrcpyA
VirtualAllocEx
VirtualFreeEx
GetCurrentThread
VirtualProtectEx
WriteProcessMemory
CreateRemoteThread
IsBadWritePtr
GetExitCodeThread
lstrcpyW
SetEndOfFile
UnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetStartupInfoW
RtlUnwind
lstrlenW
RegisterClassW
CreateWindowExW
GetMessageW
TranslateMessage
DispatchMessageW
GetThreadDesktop
CloseDesktop
GetUserObjectInformationA
OpenInputDesktop
DefWindowProcW
GetSystemMetrics
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RevertToSelf
GetUserNameW
AdjustTokenPrivileges
LookupPrivilegeValueW
GetTokenInformation
RegSetValueExW
RegCreateKeyExW
SetTokenInformation
DuplicateTokenEx
CreateProcessAsUserW
RegQueryInfoKeyW
RegEnumValueW
OpenProcessToken
RegQueryValueW
RegOpenKeyW
RegQueryValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
GetKernelObjectSecurity
SHGetSpecialFolderPathW
SHFileOperationW
ShellExecuteW
SHGetFolderPathW
ord165
CoCreateInstance
CoUninitialize
CoSetProxyBlanket
CoCreateGuid
CoInitializeEx
CoInitializeSecurity
VariantClear
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysFreeString
VariantInit
?FeedbackDialogTranslateMessage@feedback@baidu@@YAHPAUtagMSG@@@Z
?CreateFeedbackDialog@feedback@baidu@@YAKW4ProductId@12@PB_W11W4LanguageId@12@11PAUHWND__@@P6AJ111PAUtagVARIANT@@@ZPAPAUIWebBrowser2@@@Z
?FeedbackDialogExecScript@feedback@baidu@@YAJPB_WPAUtagVARIANT@@@Z
StrFormatByteSizeW
SHRegGetValueW
PathAddBackslashW
PathIsDirectoryW
PathRemoveFileSpecW
PathFileExistsW
PathAppendW
PathFindFileNameW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
WTSEnumerateSessionsW
WTSQueryUserToken
WTSFreeMemory
GetAdaptersInfo
GetAdaptersAddresses
?GetInstance@CAPCDispatcher@@SAPAV1@XZ
?WriteLog@CAPCDispatcher@@QAEHKPB_W@Z
GetModuleFileNameExW
GetModuleInformation
DestroyEnvironmentBlock
CreateEnvironmentBlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ