Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5ef895053a1a5e1d636388e3e668f760.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.5ef895053a1a5e1d636388e3e668f760.dll
Resource
win10v2004-20231023-en
Target
NEAS.5ef895053a1a5e1d636388e3e668f760.exe
Size
350KB
MD5
5ef895053a1a5e1d636388e3e668f760
SHA1
3771f4a0d070a35bc08d951dd150bc7fc54cef67
SHA256
95d1b73e6986b1b26395ac1126f73714e9ba7e5c85008355659e7c69b0ad7f16
SHA512
ab2f7573f8f283128d5d505b82eb5b78b679b01f945bcc08a8e6313769f4f139972e78294823c477857262485605664c03e8f52a0ec189dc740a0966b11cf82d
SSDEEP
6144:bfi2VwQfXMzW2Iuzc30bOLTQdiGIm9I2/eQX0Wt/iy5jXS:bTwg8zW2IuzckbO+Np2ciIS
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetPrivateProfileIntA
GetProcAddress
LoadLibraryA
WritePrivateProfileStringA
GetModuleHandleA
lstrcmpA
SetFilePointer
GetSystemTimeAsFileTime
WideCharToMultiByte
GetACP
MultiByteToWideChar
IsDBCSLeadByteEx
GetOEMCP
LoadLibraryExA
GetVersion
LocalUnlock
HeapCompact
GetProcessHeap
LocalReAlloc
IsBadWritePtr
GetSystemDirectoryA
LocalLock
GetPrivateProfileStringA
LocalAlloc
FindFirstFileW
OutputDebugStringW
CopyFileW
GetModuleFileNameW
CreateFileW
GetModuleFileNameA
DeleteFileW
GetTickCount
SetEndOfFile
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
GetStringTypeW
HeapReAlloc
LoadLibraryExW
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
GetFileType
GetStdHandle
RaiseException
RtlPcToFileHeader
HeapAlloc
HeapFree
GetCPInfo
IsValidCodePage
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
Sleep
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
HeapSize
GetModuleHandleExW
ExitProcess
GetCommandLineA
IsProcessorFeaturePresent
IsDebuggerPresent
FlushFileBuffers
DecodePointer
EncodePointer
lstrcpyA
LocalFree
GetFileInformationByHandle
CloseHandle
LocalSize
WinExec
GetCurrentThreadId
GetLocalTime
FindClose
lstrcmpiA
GetLastError
lstrcatA
ReadFile
FileTimeToSystemTime
WriteFile
SystemTimeToFileTime
MoveFileExA
lstrlenA
GetFileSize
GetMenuStringW
DialogBoxParamW
InsertMenuItemA
CreateDialogParamA
SystemParametersInfoA
GetWindowTextLengthA
WindowFromPoint
IsIconic
GetWindowTextLengthW
DestroyWindow
AppendMenuW
GetWindowTextW
PeekMessageW
IsWindowUnicode
SetWindowLongW
DefWindowProcA
GetMenuStringA
CreateDialogParamW
SetWindowLongPtrA
AppendMenuA
MessageBoxW
RegisterClassW
InsertMenuItemW
IsDialogMessageW
GetWindowTextA
SetWindowLongA
MessageBoxA
SetWindowLongPtrW
SendMessageW
CallWindowProcA
DialogBoxParamA
SetWindowTextW
SetDlgItemTextA
CallWindowProcW
RegisterClassA
DispatchMessageW
GetDesktopWindow
SetTimer
KillTimer
LoadIconA
GetDC
ReleaseDC
GetActiveWindow
DestroyIcon
SetCursor
GetDlgItemInt
ScreenToClient
GetWindowRect
GetWindowLongPtrA
SendDlgItemMessageA
TrackPopupMenu
GetTopWindow
IsZoomed
GetLastActivePopup
GetKeyState
GetParent
CallNextHookEx
MessageBeep
wsprintfA
GetClientRect
SetFocus
SendMessageA
TranslateMessage
SetDlgItemInt
InvalidateRect
GetWindowLongA
CreateWindowExA
GetDlgItem
EndDialog
SetWindowsHookExA
SetWindowPos
GetCursorPos
CheckDlgButton
ShowWindow
CreatePopupMenu
IsDlgButtonChecked
PostMessageA
UnhookWindowsHookEx
GetSystemMetrics
EnableWindow
DestroyMenu
LoadCursorA
GetWindow
SetWindowTextA
GetDeviceCaps
RegCloseKey
RegSetValueExA
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
ShellExecuteW
ShellExecuteA
AppendSpamWordFromFile
GiveFuncTable
InitializeFilter
IsJapaneseSpamSender
NotifyTuruKameInfo
PurgeSpamWordFromFile
TestSpamWordUpdate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ