Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1468be27568a8e91e2d0117bf6538b00.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.1468be27568a8e91e2d0117bf6538b00.dll
Resource
win10v2004-20231023-en
Target
NEAS.1468be27568a8e91e2d0117bf6538b00.exe
Size
2.0MB
MD5
1468be27568a8e91e2d0117bf6538b00
SHA1
ca7a6931056900ab80b02a3dae76bff6ca86f913
SHA256
6eaf3672c93a8230983ff9f199d5a714fc93084e88bc255b0cc6bb4a4cc59466
SHA512
7fd17ef9c4db336c1d0b0e39ce656730b495228dc2fc8d273cc12739dd8809df9d6d7f5636271d3518a7d71ddca078e3ed7502ff691262dc2db6ad2dc75e60a2
SSDEEP
24576:9lpbbaFHcmPv4ENuV7hwFVZnLxm9EuO4kTnEm3:XpbeFHcCvLNKknLF1Tx3
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
AcquireSRWLockExclusive
AssignProcessToJobObject
CloseHandle
CompareStringW
CreateDirectoryW
CreateEventW
CreateFileW
CreateProcessW
CreateThread
CreateTimerQueueTimer
CreateToolhelp32Snapshot
DecodePointer
DeleteCriticalSection
DeleteFileW
DeleteProcThreadAttributeList
DeleteTimerQueueTimer
DisableThreadLibraryCalls
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
ExitThread
ExpandEnvironmentStringsW
FindClose
FindFirstFileExW
FindNextFileW
FindResourceW
FlsAlloc
FlsSetValue
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
FreeResource
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDriveTypeW
GetEnvironmentStringsW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileSizeEx
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetNativeSystemInfo
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessId
GetProductInfo
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathW
GetThreadId
GetThreadPriority
GetTickCount
GetTickCount64
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExW
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitOnceExecuteOnce
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeProcThreadAttributeList
InitializeSListHead
InterlockedFlushSList
InterlockedPopEntrySList
InterlockedPushEntrySList
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
IsWow64Process
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFree
LockResource
Module32FirstW
Module32NextW
MultiByteToWideChar
OpenThread
OutputDebugStringA
OutputDebugStringW
Process32FirstW
Process32NextW
QueryPerformanceCounter
QueryPerformanceFrequency
QueryThreadCycleTime
RaiseException
ReadConsoleW
ReadFile
ReleaseSRWLockExclusive
ResetEvent
RtlCaptureContext
RtlCaptureStackBackTrace
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
SetEndOfFile
SetEnvironmentVariableW
SetEvent
SetFilePointer
SetFilePointerEx
SetHandleInformation
SetLastError
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SleepConditionVariableSRW
SleepEx
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryAcquireSRWLockExclusive
UnhandledExceptionFilter
UpdateProcThreadAttribute
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WaitForSingleObjectEx
WakeAllConditionVariable
WakeConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrlenW
AllowSetForegroundWindow
AppendMenuW
BeginPaint
CallNextHookEx
CallWindowProcW
ClientToScreen
CopyRect
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DestroyMenu
DestroyWindow
DrawTextW
EndMenu
EndPaint
EqualRect
FillRect
FindWindowExW
GetAncestor
GetCaretPos
GetClassInfoExW
GetClassLongPtrW
GetClassLongW
GetClientRect
GetCursorPos
GetDC
GetDlgCtrlID
GetDlgItem
GetForegroundWindow
GetKeyState
GetLastInputInfo
GetMonitorInfoW
GetParent
GetSysColor
GetSystemMetrics
GetWindowDC
GetWindowLongPtrW
GetWindowLongW
GetWindowRect
GetWindowThreadProcessId
InflateRect
IntersectRect
InvalidateRect
IsRectEmpty
IsWindow
IsWindowVisible
KillTimer
LoadCursorW
LoadStringW
MonitorFromPoint
MonitorFromRect
MonitorFromWindow
MoveWindow
OffsetRect
PostMessageW
PtInRect
RegisterClassExW
ReleaseDC
ScreenToClient
SendMessageW
SetClassLongW
SetCursor
SetForegroundWindow
SetRectEmpty
SetTimer
SetWindowLongPtrW
SetWindowPos
SetWindowTextW
SetWindowsHookExW
ShowWindow
TrackMouseEvent
TrackPopupMenu
UnhookWindowsHookEx
UnregisterClassW
CLSIDFromString
CoCreateGuid
CoCreateInstance
CoInitializeEx
CoRegisterInitializeSpy
CoRevokeInitializeSpy
CoTaskMemFree
CoUninitialize
CreateStreamOnHGlobal
OleSaveToStream
ReadClassStm
StringFromGUID2
WriteClassStm
ConvertSidToStringSidW
ConvertStringSidToSidW
CreateProcessAsUserW
DuplicateToken
EventRegister
EventUnregister
EventWrite
GetLengthSid
GetTokenInformation
GetUserNameW
IsValidSid
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
SetTokenInformation
SystemFunction036
BitBlt
CombineRgn
CreateCompatibleBitmap
CreateCompatibleDC
CreateRectRgnIndirect
DeleteDC
DeleteObject
ExcludeClipRect
ExtTextOutW
GetCurrentObject
GetDeviceCaps
GetObjectW
SelectObject
SetBkColor
SetBkMode
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
SysAllocString
SysAllocStringByteLen
SysFreeString
SysStringByteLen
VariantChangeType
VariantClear
VariantInit
CommandLineToArgvW
SHAppBarMessage
SHGetFolderPathW
SHGetKnownFolderPath
SHGetSpecialFolderPathW
ShellExecuteExW
GdipAlloc
GdipCloneImage
GdipCreateFromHDC
GdipCreateImageAttributes
GdipCreateSolidFill
GdipDeleteBrush
GdipDeleteGraphics
GdipDisposeImage
GdipDisposeImageAttributes
GdipDrawImageRectRectI
GdipFillRectangleI
GdipFree
GdipGetDC
GdipGetImageHeight
GdipGetImageWidth
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipLoadImageFromStream
GdipReleaseDC
GdipSetImageAttributesColorMatrix
GdipSetInterpolationMode
GdiplusShutdown
GdiplusStartup
WinHttpAddRequestHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpCrackUrl
WinHttpOpen
WinHttpOpenRequest
WinHttpQueryHeaders
WinHttpReadData
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpWriteData
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
BeginBufferedPaint
CloseThemeData
DrawThemeBackground
DrawThemeParentBackground
DrawThemeTextEx
EndBufferedPaint
GetThemeInt
OpenThemeData
CreateEnvironmentBlock
DestroyEnvironmentBlock
timeGetTime
ord176
DllCanUnloadNow
DllGetClassObject
GetHandleVerifier
InstallHooks
UninstallHooks
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ