Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d6ea38bb2926d21dacd60a66ce808630_JC.dll
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.d6ea38bb2926d21dacd60a66ce808630_JC.dll
Resource
win10v2004-20231023-en
Target
NEAS.d6ea38bb2926d21dacd60a66ce808630_JC.exe
Size
121KB
MD5
d6ea38bb2926d21dacd60a66ce808630
SHA1
21c9cc949a55e59c60674850ff3180400f369834
SHA256
402b8fb0b63730d756a879e1988a14000aaad3322550e519a70f8cace326821b
SHA512
909f125db323468c11dbd9ae502594ffa2de71f3a201e82518581017899540f27527272e6def7fa943c6ff81a0d33cf92351b2b8a814103e0a0e8be89b51653d
SSDEEP
1536:f4rtyajpjtj0Wnn/9HjgjSjRjVoL5wjNNdOn7uVYfMWup7wSbgWp/TZXXrLCAamv:w8UNmn7u7e/WBT5Mfc7OB7ymk
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CharNextA
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
StringFromGUID2
CLSIDFromString
PathIsRootW
PathIsURLW
PathIsRelativeW
PathStripToRootW
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
UnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
WideCharToMultiByte
MultiByteToWideChar
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
RaiseException
FindResourceA
lstrcmpW
FreeLibrary
GetProcAddress
GetModuleHandleA
lstrcmpiA
IsDBCSLeadByte
GetLastError
OutputDebugStringW
GetModuleFileNameA
DeleteCriticalSection
DisableThreadLibraryCalls
DecodePointer
EncodePointer
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
InitializeCriticalSectionEx
CloseHandle
GetModuleFileNameW
SetEvent
GetFullPathNameW
GetCurrentDirectoryW
ResetEvent
LoadLibraryExA
InitializeCriticalSection
RegSetValueExA
RegQueryInfoKeyW
RegDeleteKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegQueryInfoKeyA
SysAllocString
SysFreeString
LoadRegTypeLi
VarBstrCat
SysStringLen
SysAllocStringLen
VariantInit
SafeArrayCreate
SafeArrayPutElement
SafeArrayRedim
VarUI4FromStr
VariantClear
?_Xbad_alloc@std@@YAXXZ
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
_except_handler4_common
__std_exception_copy
__std_exception_destroy
_CxxThrowException
memcpy
memset
__std_type_info_destroy_list
__CxxFrameHandler3
__vcrt_InitializeCriticalSectionEx
__std_terminate
memmove
strchr
wcschr
strrchr
wcsstr
strstr
_purecall
wcsrchr
__telemetry_main_invoke_trigger
__telemetry_main_return_trigger
memcmp
__stdio_common_vsprintf
__stdio_common_vswprintf_s
__stdio_common_vswscanf
__stdio_common_vsprintf_s
__stdio_common_vsscanf
__stdio_common_vswprintf
wcsncmp
_wcsicmp
strcat_s
strcpy_s
strncpy_s
wcsnlen
wmemcpy_s
strnlen
isupper
isxdigit
iswspace
_strdup
strncmp
isalnum
isspace
isdigit
_invalid_parameter_noinfo
_resetstkoflw
_crt_atexit
_execute_onexit_table
_register_onexit_function
_errno
_initialize_onexit_table
_initialize_narrow_environment
_seh_filter_dll
_initterm_e
_invalid_parameter_noinfo_noreturn
_initterm
_cexit
terminate
_recalloc
_callnewh
free
malloc
bsearch
qsort
_mbscmp
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
VSDllRegisterServer
VSDllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ