Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0081d5b83a7e06ad31531b0f6b546810.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.0081d5b83a7e06ad31531b0f6b546810.exe
Resource
win10v2004-20231023-en
Target
NEAS.0081d5b83a7e06ad31531b0f6b546810.exe
Size
328KB
MD5
0081d5b83a7e06ad31531b0f6b546810
SHA1
4b431dd3958b4ea549e5a3d36e67bd372fd35de3
SHA256
345c5bb3927eb31351960c4230a8d52025f3d13f57937573a1a02944d46bd3af
SHA512
de7a8db53e3a23bd36b53dd2b9d4af28c0193a56cae7ba3fe5774713c48d48543404f5fe0c6f333a450dc76eded0ebc342c34c94e67326d49579348d7d88899e
SSDEEP
6144:0wNrjWby0jIKEWJUaCw9BClyXyQYCV8RsgQ:0wNrjWby0jIKfJgw9BnXyQLV8u
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RtlVirtualUnwind
RtlCaptureContext
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
NtTerminateThread
NtTerminateProcess
NtOpenKey
RtlNtStatusToDosError
RtlInitUnicodeString
NtSetInformationFile
NtQueryInformationFile
NtCreateFile
NtClose
GetWindowRect
GetClientRect
SetWindowTextW
SetForegroundWindow
KillTimer
LoadImageW
SetTimer
SetDlgItemTextW
GetDlgItem
EndDialog
SendMessageW
CallWindowProcW
CreateWindowExW
DestroyWindow
SendDlgItemMessageW
SetFocus
EnableWindow
GetSystemMetrics
AllowSetForegroundWindow
SetPropW
GetPropW
MessageBoxW
ClientToScreen
GetWindowLongPtrW
ScreenToClient
wsprintfW
ExitWindowsEx
DestroyIcon
DefWindowProcW
RegisterClassW
CreateMenu
CreatePopupMenu
DestroyMenu
GetMenuItemCount
TrackPopupMenu
GetMenuInfo
SetMenuInfo
InsertMenuItemW
GetDC
GetSysColorBrush
DrawIconEx
IsWindowEnabled
GetWindowTextW
MapWindowPoints
GetWindowLongW
SetWindowLongW
GetMessageW
PostThreadMessageW
GetAsyncKeyState
SetWindowLongPtrW
GetDesktopWindow
DialogBoxParamW
SetWindowPos
MoveWindow
ShowWindow
DialogBoxIndirectParamW
SHBindToParent
ShellExecuteW
ExtractAssociatedIconW
ExtractIconW
ExtractIconExW
SHGetSpecialFolderPathW
SHGetFolderPathW
ShellExecuteExW
SHAutoComplete
PathFileExistsW
AssocQueryStringW
StrStrIW
LockResource
SizeofResource
FindResourceW
GlobalAlloc
GlobalUnlock
GlobalLock
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadResource
GlobalFree
QueryPerformanceCounter
InitializeSListHead
FormatMessageW
WriteConsoleW
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetStdHandle
GetStringTypeW
SetFilePointerEx
MultiByteToWideChar
WideCharToMultiByte
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetModuleHandleExW
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetFileType
GetFileAttributesExW
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
RaiseException
LoadLibraryW
GetProcAddress
GetVersionExW
GetCurrentThreadId
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
GetTickCount
GetModuleHandleW
LocalFree
GetCurrentProcessId
GetStartupInfoW
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
RemoveDirectoryW
CloseHandle
SetLastError
HeapCreate
HeapDestroy
WaitForSingleObject
CreateEventW
Sleep
ExitProcess
GetExitCodeProcess
CreateThread
CreateProcessW
ProcessIdToSessionId
GetSystemTimeAsFileTime
GetModuleFileNameW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetFileAttributesW
GetFullPathNameW
GetSystemWindowsDirectoryW
CreateFileW
GetLogicalDrives
HeapReAlloc
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
GetStdHandle
GetCommandLineW
SetCurrentDirectoryW
GetCurrentDirectoryW
WriteFile
FindFirstFileExW
CreateCompatibleDC
CreateCompatibleBitmap
PatBlt
SelectObject
SbieApi_QueryConf
File_GetName
Key_GetName
SbieDll_SetFakeAdmin
SbieDll_StartCOM
SbieDll_CallServer
SbieDll_RunSandboxed
SbieDll_FormatMessage
SbieDll_GetTokenElevationType
SbieDll_Unmount
SbieDll_Mount
SbieDll_KillAll
SbieDll_GetLanguage
SbieDll_GetStartError
SbieDll_StartSbieSvc
SbieDll_RunStartExe
SbieDll_GetSysFunction
SbieApi_IsBoxEnabled
SbieApi_ReloadConf
SbieApi_DisableForceProcess
SbieApi_GetHomePath
SbieDll_InitPStore
SbieApi_QueryProcessInfo
SbieDll_GetHandlePath
SbieDll_IsDirectory
SbieDll_IsReservedFileName
SbieDll_TranslateNtToDosPath
SbieApi_EnumBoxes
SbieApi_EnumProcessEx
SbieApi_QueryBoxPath
SbieApi_QueryProcess
SbieDll_FreeMem
SbieDll_CallServerQueue
SbieDll_FormatMessage1
SbieDll_FormatMessage0
SbieApi_QueryConfBool
SbieApi_Call
SbieApi_EnumBoxesEx
CoTaskMemFree
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
RegEnumValueW
InitCommonControlsEx
GetOpenFileNameW
GdipDisposeImage
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStream
GdiplusStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ