Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.3a8b2fa9753108980ef13ba3f6460e70.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.3a8b2fa9753108980ef13ba3f6460e70.dll
Resource
win10v2004-20231020-en
Target
NEAS.3a8b2fa9753108980ef13ba3f6460e70.exe
Size
1.8MB
MD5
3a8b2fa9753108980ef13ba3f6460e70
SHA1
d5bc10be6a4f01b1957bf52c5a15ec69ce25b411
SHA256
29b4fb39bb43ce1565b46082a33b506e9fab98046341579635a755355560395e
SHA512
4ee5dacafcf189d4ce7cd8d7460cd0645612cb1a23cde2be30ca87207e783b627415e0599ba726fe13b849cd458a137ea94365ff1ff7acb4c0e307a0fcb222e8
SSDEEP
49152:fWtrCQPvdcP2k9Ku/YbZ4MnJWwg8a78kBS:fW/vq9JSZjEn8ES
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CoUninitialize
fflush
rand
SetPortW
GetNumberOfEventLogRecords
SaferIdentifyLevel
ImpersonateAnonymousToken
FindMimeFromData
GetProcAddress
GetModuleHandleW
GetBinaryTypeA
LoadLibraryExA
GetModuleFileNameA
LoadLibraryA
SetUserGeoID
CheckRemoteDebuggerPresent
GetSystemTimeAsFileTime
GetCommConfig
CreateSemaphoreA
VirtualAlloc
DeleteTimerQueue
SetWindowPlacement
VkKeyScanExA
VkKeyScanW
GetTitleBarInfo
SetWindowLongW
LoadTypeLibEx
GetErrorInfo
StrRStrIW
PathRemoveBlanksA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ