Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fb4ecf6b113270fb60f99470bea0a040.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.fb4ecf6b113270fb60f99470bea0a040.dll
Resource
win10v2004-20231023-en
Target
NEAS.fb4ecf6b113270fb60f99470bea0a040.exe
Size
1.8MB
MD5
fb4ecf6b113270fb60f99470bea0a040
SHA1
129d85634dd6d0c229d551bf3f8d5b5123cf1006
SHA256
50afb7ec49ce990d0bac26d219c13dba7baf0c6c6888f544723f10ba33396898
SHA512
ffc44b3fb03fbc1009aa2d71ab47d590266669237d4f0f2f9c928c6849e9b1e80f2a97fba350c2528167a8ccb8c1bc3090d267435c990f023bf066ec4e3d72ac
SSDEEP
24576:z85mY8Llf4gQzN4FgC6R6ApOGQxMMCHiMVowoVQ7pf6EX0b/YTk2IbmsAoksbyZR:zlh48zAp0miWbQEXuv2hsAo6ZR
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CoUninitialize
fflush
rand
FindMimeFromData
SetUserGeoID
CheckRemoteDebuggerPresent
GetSystemTimeAsFileTime
GetCommConfig
CreateSemaphoreA
VirtualAlloc
LoadLibraryExA
GetModuleFileNameA
GetBinaryTypeA
LoadLibraryA
GetProcAddress
GetModuleHandleW
DeleteTimerQueue
LoadTypeLibEx
GetErrorInfo
ImpersonateAnonymousToken
GetNumberOfEventLogRecords
SaferIdentifyLevel
StrRStrIW
PathRemoveBlanksA
VkKeyScanExA
SetWindowLongW
GetTitleBarInfo
SetWindowPlacement
VkKeyScanW
SetPortW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ