Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d4c891dfbf5efb3ed09a7856f10278a0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.d4c891dfbf5efb3ed09a7856f10278a0.exe
Resource
win10v2004-20231020-en
Target
NEAS.d4c891dfbf5efb3ed09a7856f10278a0.exe
Size
610KB
MD5
d4c891dfbf5efb3ed09a7856f10278a0
SHA1
88182c7e48ff037bd269bb26e84c1d2997ae653d
SHA256
56cbc2d60d283ed21c60451640f83cdee90415f1e4ca2a46c48def631bd4fa11
SHA512
f4d96a3c5569bb1a42ad4a7eb588fa09ecb59994c3e8cfb46e9359f68170587723f2ba6aa6af2896b35ad994a90428588c86eb9b8ab5ad078cffc9afd6f53bd4
SSDEEP
12288:Zu9C4e703rjM9xccLQVx38R4hf8Tvn8CHyNd:Zu9C4AHcJVx38+O78mgd
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
InternetCheckConnectionA
HeapFree
GetLocalTime
HeapAlloc
GetLogicalDrives
GetSystemTimeAsFileTime
GetDateFormatA
GetTimeFormatA
GetStartupInfoA
ExitProcess
ExitThread
CreateThread
RaiseException
RtlPcToFileHeader
VirtualProtect
VirtualAlloc
VirtualQuery
HeapReAlloc
HeapQueryInformation
HeapSize
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
HeapSetInformation
HeapCreate
RtlUnwindEx
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
RtlLookupFunctionEntry
GetTickCount
GetFileTime
GetFileSizeEx
GetFileAttributesA
SetErrorMode
GetModuleHandleW
GetOEMCP
GetCPInfo
GetFullPathNameA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetCurrentDirectoryA
WaitForMultipleObjects
ReleaseMutex
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GetModuleFileNameW
FormatMessageA
LocalFree
GlobalGetAtomNameA
GlobalFindAtomA
MultiByteToWideChar
lstrcmpW
WritePrivateProfileStringA
GlobalUnlock
GlobalFree
FreeResource
GetCurrentProcessId
GlobalAddAtomA
CreateEventA
SuspendThread
ResumeThread
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
CompareStringA
GlobalLock
lstrcmpA
GlobalAlloc
SetFileAttributesA
CopyFileA
DeleteFileA
GetDiskFreeSpaceExA
SetLastError
lstrlenA
CreateToolhelp32Snapshot
Process32First
OpenProcess
ProcessIdToSessionId
Process32Next
WaitForSingleObject
GetModuleHandleA
GetCurrentProcess
CreateFileA
DeviceIoControl
GetEnvironmentVariableA
LoadLibraryA
GetProcAddress
FreeLibrary
GlobalMemoryStatus
GetSystemDefaultLCID
GetLocaleInfoA
GetWindowsDirectoryA
GetVolumeInformationA
GetComputerNameA
GetSystemInfo
GetVersionExA
MulDiv
GetCommandLineA
SetEvent
PulseEvent
UnmapViewOfFile
CreateFileMappingA
GetLastError
OpenFileMappingA
MapViewOfFile
CreateProcessA
CloseHandle
GetSystemDirectoryA
Sleep
WinExec
OutputDebugStringA
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
CreateMutexA
UnregisterClassA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
CharUpperA
GetSysColorBrush
ReleaseCapture
LoadCursorA
SetCapture
MsgWaitForMultipleObjects
DestroyMenu
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextA
GetForegroundWindow
GetTopWindow
GetWindowLongPtrA
SetWindowLongPtrA
UnhookWindowsHookEx
PostThreadMessageA
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetMenu
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
EqualRect
GetDlgCtrlID
PtInRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
IntersectRect
GetWindowPlacement
GetWindowRect
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostQuitMessage
MessageBoxA
RegisterClipboardFormatA
GetProcessWindowStation
OpenWindowStationA
GetMessageTime
SetProcessWindowStation
CloseWindowStation
OpenDesktopA
CloseDesktop
GetSubMenu
GetMenuItemID
GetMenuItemCount
DrawEdge
LoadBitmapA
OffsetRect
InflateRect
CopyRect
GetMenuItemInfoA
DrawIconEx
SystemParametersInfoA
GetSysColor
GetKeyboardLayout
MapVirtualKeyExA
IsCharLowerA
MapVirtualKeyA
GetKeyNameTextA
SetForegroundWindow
PostMessageA
SetMenuDefaultItem
CreatePopupMenu
GetCursorPos
GetMenuDefaultItem
DestroyIcon
LoadIconA
EnableWindow
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
GetSystemMetrics
AdjustWindowRectEx
CreateRectRgnIndirect
GetRgnBox
GetMapMode
GetBkColor
CreateSolidBrush
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
SelectObject
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
BitBlt
PatBlt
Rectangle
GetTextColor
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
GetObjectA
CreateFontA
CreateFontIndirectA
CreateDIBitmap
GetFileTitleA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegQueryInfoKeyA
RegQueryValueA
RegEnumKeyA
RegGetKeySecurity
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
RegUnLoadKeyA
RegLoadKeyA
RegRestoreKeyA
RegSaveKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegFlushKey
RegOpenKeyA
RegCreateKeyA
RegEnumValueA
GetCurrentHwProfileA
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
LookupAccountSidA
ImpersonateLoggedOnUser
CreateProcessAsUserA
RevertToSelf
Shell_NotifyIconA
ShellExecuteExA
ShellExecuteA
ord17
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
ord8
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoGetClassObject
VariantTimeToSystemTime
VariantCopy
SysAllocString
SafeArrayDestroy
OleCreateFontIndirect
SysAllocStringByteLen
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysFreeString
VarUdateFromDate
SystemTimeToVariantTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ