Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.596238ad8c4c62c2be02540f7c91d350.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.596238ad8c4c62c2be02540f7c91d350.exe
Resource
win10v2004-20231023-en
Target
NEAS.596238ad8c4c62c2be02540f7c91d350.exe
Size
1.6MB
MD5
596238ad8c4c62c2be02540f7c91d350
SHA1
e23859777d557965fe5c5050607a0e985df56b70
SHA256
d4e60aafdb869a67390b247a99ad576bd69ea475f41decd0f64218f6120a538b
SHA512
1beb88b487907bcab7d1f5b1f88900e53becae3a7d12e3b9495f7ec4bc905743dd8d799cd0239edc34a7e764af49af21f75bf5cceff5b2ab5f180f8de73dd215
SSDEEP
24576:vRZ4CajLWbj4np2M64QXlPN8xvvpy6RdyQ:vECUWEI4mr89ZPt
ExtKeyUsageCodeSigning
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
SetLastError
GetCommandLineW
FindNextFileW
GetCurrentProcess
TerminateProcess
FindClose
GetFileAttributesW
MultiByteToWideChar
GetLastError
GlobalFlags
GetSystemInfo
GetCurrentProcessId
CreateProcessW
GetModuleHandleW
WideCharToMultiByte
VirtualQuery
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
CreateEventW
SetEvent
ResetEvent
GetSystemTimeAsFileTime
WriteConsoleW
HeapSize
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetConsoleMode
GetConsoleOutputCP
GetFileType
SetFilePointerEx
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStdHandle
GetCommandLineA
GetModuleHandleExW
RtlUnwind
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
FreeLibrary
GetProcAddress
LoadLibraryW
GetTickCount
DeleteCriticalSection
FindResourceW
LoadResource
LockResource
FreeResource
GetCurrentThreadId
InitializeCriticalSection
SizeofResource
ExitProcess
MulDiv
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
LeaveCriticalSection
EnterCriticalSection
TryEnterCriticalSection
CreateThread
WriteFile
IsDebuggerPresent
GetModuleFileNameW
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileW
GetDesktopWindow
LoadCursorW
LoadIconW
LoadStringW
LoadImageW
MessageBoxW
ReleaseDC
MonitorFromWindow
WaitForInputIdle
GetDC
SelectObject
CreateDIBSection
CreateCompatibleDC
GetDeviceCaps
DeleteDC
GetObjectW
DeleteObject
SetDIBColorTable
RegCloseKey
RegOpenKeyExW
RegQueryValueW
ShellExecuteW
CoUninitialize
CreateStreamOnHGlobal
CoInitializeEx
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
GdiplusStartup
GdiplusShutdown
GdipGetImageHeight
GdipGetImagePaletteSize
GdipCloneImage
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipAlloc
GdipDrawImageRectI
GdipDisposeImage
GdipGetImagePixelFormat
GdipFree
GdipBitmapLockBits
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipGetImagePalette
GdipSetCompositingMode
GdipGetImageWidth
GdipCreateBitmapFromFile
GdipCreateBitmapFromScan0
WSACleanup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ