AmdPowerXpressRequestHighPerformance
NEXUS_RendImp_GetInterface
NvOptimusEnablement
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f77d1f2c8e3fa02262d45577b3ea7780.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.f77d1f2c8e3fa02262d45577b3ea7780.exe
Resource
win10v2004-20231020-en
Target
NEAS.f77d1f2c8e3fa02262d45577b3ea7780.exe
Size
2.3MB
MD5
f77d1f2c8e3fa02262d45577b3ea7780
SHA1
abb4018ab7d7762788a43d68e7f59cdccf007e96
SHA256
5bbd7eb964097af4658da1b2630252cb09de3935db2cff8ccdac9c367b25b3dc
SHA512
4c6de005180846c0cb8549536304ded0be7b2c867ce43d7737114c4a330d472d71dbaba8ca27992ada0063541e77450f468320010e186e676ee09e10e1f5a747
SSDEEP
49152:4iiocnDqpVrv/4Ak0GDmhMEAdFDqY9zH4uxGcQqAezxc7bYRcQpJoTSkSAN3632r:goKDqrj/TmEqFD99zB6h6mK6Bq
Checks for missing Authenticode signature.
resource |
---|
NEAS.f77d1f2c8e3fa02262d45577b3ea7780.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InitializeCriticalSection
FindClose
CreateMutexA
LocalAlloc
GetModuleHandleA
Sleep
GetLastError
OpenMutexA
GetFileAttributesA
GetCurrentThread
LoadLibraryA
GetVersionExA
DeleteFileA
GlobalAlloc
CloseHandle
CreateThread
GetUserGeoID
GetProcAddress
GlobalLock
LocalFree
RemoveDirectoryA
DeleteCriticalSection
FreeLibrary
CreateDirectoryA
GlobalUnlock
WriteConsoleW
SetEndOfFile
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
LeaveCriticalSection
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExA
GetTimeZoneInformation
GetFullPathNameW
GetCurrentDirectoryW
SetStdHandle
DecodePointer
LCMapStringW
CompareStringW
FlushFileBuffers
GetStringTypeW
HeapAlloc
HeapReAlloc
HeapFree
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
WriteFile
GetStdHandle
WideCharToMultiByte
MultiByteToWideChar
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
FindNextFileA
GetGeoInfoA
EnterCriticalSection
FindFirstFileA
GetModuleFileNameA
ReadFile
lstrlenA
GetCommandLineW
ExitProcess
GetFileType
GetDriveTypeW
CreateFileW
SetFilePointerEx
GetModuleHandleExW
LoadLibraryExW
EncodePointer
HeapSize
RaiseException
RtlUnwind
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
QueryPerformanceFrequency
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
GetStartupInfoW
SetRect
IsClipboardFormatAvailable
GetDesktopWindow
GetDlgItem
GetClientRect
RegisterClassExA
UpdateWindow
LoadIconA
SetClipboardData
PostQuitMessage
SetForegroundWindow
SetCursorPos
GetCursorPos
PeekMessageA
OpenClipboard
SendMessageA
AdjustWindowRectEx
GetMessageA
EnumDisplayDevicesA
DispatchMessageA
GetWindowRect
LoadCursorA
DestroyWindow
SetWindowPos
EndDialog
GetSystemMetrics
DialogBoxParamA
ShowWindow
ClipCursor
GetDlgItemTextA
SetWindowLongA
ClientToScreen
CloseClipboard
EmptyClipboard
GetWindowTextA
ValidateRect
SetWindowTextA
MessageBoxA
MoveWindow
EnumWindows
DefWindowProcA
CreateWindowExA
SetFocus
BringWindowToTop
TranslateMessage
GetClipboardData
SetDlgItemTextA
SetCursor
GetOpenFileNameA
GetSaveFileNameA
SetEntriesInAclA
AllocateAndInitializeSid
GetUserNameA
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DragQueryFileA
SHGetFolderPathA
ShellExecuteA
DragQueryPoint
DragAcceptFiles
timeGetTime
timeBeginPeriod
Netbios
htons
recv
connect
socket
send
WSAStartup
gethostbyname
closesocket
Direct3DCreate9
D3DXCompileShader
AmdPowerXpressRequestHighPerformance
NEXUS_RendImp_GetInterface
NvOptimusEnablement
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ