Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a5adc6221347e4b8d449f4673fc1ce40.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.a5adc6221347e4b8d449f4673fc1ce40.exe
Resource
win10v2004-20231020-en
Target
NEAS.a5adc6221347e4b8d449f4673fc1ce40.exe
Size
173KB
MD5
a5adc6221347e4b8d449f4673fc1ce40
SHA1
45587ab80dc972033d62c21ea72e8ccf0548d4a1
SHA256
2a2aa8b0ba11f14bb7fa12ad9f476017bf01adb3c1652a799977b7de07a96e9e
SHA512
a87d5d6a2a5595d4186cdd4cda8863dcbd55c6883266fc31e20c8821031bdd267c8d35d3152cd3705ae101a032bb474b9b09e0a0b0f9a89c02117634d904c22d
SSDEEP
3072:eemDgKlGD7rmqP6CIqmphvF6ifSC1EKyAqiv/sZpMmZMB:eewngXmZRphvF6iEtTZqmZI
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
CreateDirectoryW
GetLastError
SetFileAttributesW
Sleep
GetTickCount
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
lstrcpynA
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
LoadLibraryW
CreateProcessW
lstrcmpiA
CloseHandle
GetTempFileNameW
lstrcatW
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
GetModuleHandleA
OpenProcess
lstrcpyW
GetVersionExW
GetSystemDirectoryW
GetVersion
lstrcpyA
RemoveDirectoryW
SetEvent
GetCurrentThreadId
UnmapViewOfFile
CreateEventW
MapViewOfFile
CreateFileMappingW
OutputDebugStringW
OutputDebugStringA
GetCurrentProcessId
GetLocalTime
GetEnvironmentVariableW
InitializeCriticalSection
SystemTimeToFileTime
GetSystemTime
GlobalReAlloc
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
lstrcmpiW
lstrcmpW
ExpandEnvironmentStringsW
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GlobalFree
GetModuleHandleW
LoadLibraryExW
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
WideCharToMultiByte
lstrlenA
WriteFile
ReadFile
MultiByteToWideChar
SetFilePointer
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
CreateFileW
MulDiv
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
GetClassInfoW
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
wvsprintfW
DispatchMessageW
PeekMessageW
wsprintfA
ScreenToClient
IsDlgButtonChecked
GetAsyncKeyState
CheckDlgButton
LoadCursorW
SetCursor
GetWindowLongW
GetSysColor
CharNextW
ExitWindowsEx
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
FindWindowExW
IsWindow
GetDlgItem
SetWindowLongW
LoadImageW
GetDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
EndPaint
SendMessageTimeoutW
CreateFontIndirectW
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
SelectObject
SetBkMode
SetTextColor
SHFileOperationW
SHGetFileInfoW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHGetFolderPathW
ShellExecuteW
RegEnumValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
ord17
CoTaskMemFree
OleInitialize
CoCreateInstance
OleUninitialize
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
InternetConnectW
InternetOpenW
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
PathCombineW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ