Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1312daecfcecde6d40fa50e0f4f497f0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.1312daecfcecde6d40fa50e0f4f497f0.exe
Resource
win10v2004-20231020-en
Target
NEAS.1312daecfcecde6d40fa50e0f4f497f0.exe
Size
133KB
MD5
1312daecfcecde6d40fa50e0f4f497f0
SHA1
30b7fe799a1f713942d5f6ad7ccd3b1a4989dbe0
SHA256
0389801a1c204b6485645ab69f264aaa2f5926ba1824bf2651e73f2028c7ddf5
SHA512
7e238fa2ee727b1724c177014e2d388832982489b59fd1b949c0bef586763067cd81d72a2ebe5274da1a86b231dcdd4fcff312ee88c2aa78cd077979baa96c42
SSDEEP
1536:SmhEqF5kCOjJylzvMaMrHo4hk5//86HIEExJj2ItEKsaEGBrG/KJaeCC:FEqFGJGNBboPJj/tEKsaxJGyUo
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetLocaleInfoA
FindClose
FindFirstFileA
GetCurrentProcess
GetCurrentThread
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
lstrlenA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
ExpandEnvironmentStringsA
Sleep
GetTickCount
FreeLibrary
SetErrorMode
GetProcAddress
LoadLibraryA
GetSystemTimeAsFileTime
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetStringTypeW
GetStringTypeA
GetModuleHandleA
GetModuleFileNameA
CreateMutexA
GetLastError
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSection
GetCPInfo
GetUserDefaultLCID
GetVersionExA
LCMapStringW
LCMapStringA
HeapSize
GetConsoleMode
GetConsoleCP
SetFilePointer
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
InterlockedExchange
GetACP
GetThreadLocale
FreeEnvironmentStringsW
LocalFree
HeapFree
HeapAlloc
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsA
GetEnvironmentStrings
GetOEMCP
wsprintfA
GetDlgItem
SetWindowPos
MoveWindow
LoadStringA
SetWindowTextA
EnableWindow
DialogBoxParamA
SetFocus
EndDialog
UpdateWindow
FindWindowA
GetWindowThreadProcessId
GetClientRect
MessageBoxA
GetWindowRect
ShowWindow
FreeSid
RegQueryValueExA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
GetTokenInformation
EqualSid
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
CoUninitialize
CoInitialize
OleRun
VarI4FromStr
SysAllocString
VariantClear
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ