Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.611a93df5393c4b41561e0e90597e3d0.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.611a93df5393c4b41561e0e90597e3d0.dll
Resource
win10v2004-20231020-en
Target
NEAS.611a93df5393c4b41561e0e90597e3d0.exe
Size
649KB
MD5
611a93df5393c4b41561e0e90597e3d0
SHA1
e195e2849f9361a9a2b157b310f604fb1deb4fc8
SHA256
8e3af3393938a7caf14834d44ec55cb760e91366a89a781f000fe38819641f1d
SHA512
a0f4264fb2ac96457acc75783cb3b750b76954577b0aca7a12fe4256534b3e65b42eca624fed61649711f136eb7baf18e980ab8dc90cf3fc2ccffe834b59aff6
SSDEEP
12288:ofIS/VNw+GQrVZLnzhfhyhAhzhGhmhHhEh9h6hChlhMhvhuhehrhYhqh3h0htVuV:ofIS/VNw+GOV1nr
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
VirtualProtect
GetTickCount
GetCurrentThreadId
AddVectoredExceptionHandler
RemoveVectoredExceptionHandler
GetProcAddress
GetModuleHandleW
OpenThread
GetThreadContext
SetThreadContext
CloseHandle
GetModuleFileNameW
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
VirtualProtectEx
Process32FirstW
CreateToolhelp32Snapshot
Process32NextW
GetCurrentProcessId
OpenEventW
OpenProcess
GetWindowsDirectoryW
CreateProcessW
WaitForSingleObject
CreateEventA
SetEvent
GetTimeZoneInformation
CompareStringW
GetTimeFormatA
GetDateFormatA
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
SetEndOfFile
CreateFileW
DeviceIoControl
GetLastError
GetFileAttributesW
SetLastError
GetModuleHandleA
AreFileApisANSI
LocalFree
FormatMessageA
HeapFree
FlsSetValue
GetCommandLineA
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
HeapAlloc
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetLocaleInfoW
HeapSetInformation
GetVersion
HeapCreate
HeapDestroy
FlsGetValue
FlsFree
FlsAlloc
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetConsoleCP
GetConsoleMode
SetFilePointer
ReadFile
FlushFileBuffers
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
LoadLibraryW
WriteConsoleW
SetStdHandle
GetProcessHeap
TlsAlloc
TlsFree
TlsGetValue
OpenEventA
ResetEvent
TlsSetValue
SetEnvironmentVariableA
UnregisterClassW
SetTimer
CreateWindowExW
RegisterClassW
DestroyWindow
DefWindowProcW
StrStrIW
CreateProcessNotify
switch_processor_mode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ