Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.363e9720f5513bfbfacd16a3c9f8f9a0.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.363e9720f5513bfbfacd16a3c9f8f9a0.dll
Resource
win10v2004-20231023-en
Target
NEAS.363e9720f5513bfbfacd16a3c9f8f9a0.exe
Size
1.8MB
MD5
363e9720f5513bfbfacd16a3c9f8f9a0
SHA1
b02043a1581c514ed997bd942044883173689cdc
SHA256
e48221ffc402554ca769ca629518a70354533f956912ae2c65cde5177d9bb423
SHA512
4c35e18bcb00b48a515a1b26033a6f07ad1435e0658a4ab75b1dc364526ca095087521460426150c21c4fc349c3d3f677a98e917f2da868975b18a7c456d5edd
SSDEEP
49152:O7H4eSiFMCHO08trjOuWnYtSZfizAPMOWJkLHB6iTrqhI:EYepMCu0BJna5srLHA6qhI
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
fwrite
rand
ImpersonateAnonymousToken
CreateServiceW
SaferIdentifyLevel
EnumDisplayMonitors
SetWindowPlacement
VkKeyScanExA
GetTitleBarInfo
MonitorFromPoint
PathRemoveBlanksA
StrRStrIW
FindMimeFromData
AddPrinterDriverExW
LoadTypeLibEx
GetErrorInfo
OleLockRunning
SetUserGeoID
CheckRemoteDebuggerPresent
GetModuleFileNameA
LoadLibraryExA
VirtualAlloc
OutputDebugStringA
GetCurrentDirectoryW
GetSystemTimeAsFileTime
LoadLibraryA
GetProcAddress
GetBinaryTypeA
DeleteTimerQueue
GetModuleHandleW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ