Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5acd9b9fc6e55a848dac412cbd364b20.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.5acd9b9fc6e55a848dac412cbd364b20.dll
Resource
win10v2004-20231023-en
Target
NEAS.5acd9b9fc6e55a848dac412cbd364b20.exe
Size
520KB
MD5
5acd9b9fc6e55a848dac412cbd364b20
SHA1
702d5eabbfb836c7b8c557e8b380176db45343cf
SHA256
7ddce712527f08a7be9d6f39c816f27765aa2af8d85662c70f512c8ccb468c0b
SHA512
fefa023d19ffa13003f2de2016540cc10b0bb1d88d9a9ed38c05b1ddb72352f31831a60cacc5607524f2b5b20a079d1ca84ed78794ec095e21b07b3390f2d532
SSDEEP
12288:IG25gV2z6//TZMAS6zNKmn1UBjvrEH7Yf:IGzV2zSZMAtNcrEH7S
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
AcquireSRWLockExclusive
CloseHandle
CompareFileTime
CompareStringW
CreateDirectoryW
CreateEventW
CreateFileW
CreateMutexW
CreateProcessW
CreateThread
DebugBreak
DecodePointer
DeleteCriticalSection
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
FindResourceExW
FlushFileBuffers
FlushInstructionCache
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetEnvironmentStringsW
GetExitCodeProcess
GetFileSizeEx
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessTimes
GetProductInfo
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemTimeAsFileTime
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExW
HeapAlloc
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeSListHead
InterlockedFlushSList
InterlockedPopEntrySList
InterlockedPushEntrySList
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LoadResource
LocalFree
LockResource
MultiByteToWideChar
OpenProcess
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
ReleaseMutex
ReleaseSRWLockExclusive
ResetEvent
RtlUnwind
SetEndOfFile
SetEnvironmentVariableW
SetEvent
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
SleepConditionVariableSRW
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualFree
WaitForSingleObject
WaitForSingleObjectEx
WakeAllConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
CreateUri
URLDownloadToCacheFileW
CallWindowProcW
CharLowerBuffW
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageW
GetAncestor
GetClassInfoExW
GetWindowLongW
KillTimer
LoadCursorW
MsgWaitForMultipleObjects
PeekMessageW
RegisterClassExW
SetTimer
SetWindowLongW
TranslateMessage
UnregisterClassW
DispCallFunc
LoadRegTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SysStringLen
VariantClear
VariantInit
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetTokenInformation
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegGetValueW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
SystemFunction036
ord437
PathCombineW
PathFileExistsW
ord12
StrChrW
ord154
StrStrW
UrlUnescapeW
SHGetKnownFolderPath
SHGetSpecialFolderPathW
ShellExecuteW
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CoUninitialize
CommitUrlCacheEntryBinaryBlob
DeleteUrlCacheContainerW
DeleteUrlCacheEntryW
GetUrlCacheEntryBinaryBlob
UrlCacheCreateContainer
UrlCacheFindFirstEntry
UrlCacheFindNextEntry
UrlCacheFreeEntryInfo
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ