Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
78952af2d03049bce0afae7bee348000_NEAS.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
78952af2d03049bce0afae7bee348000_NEAS.dll
Resource
win10v2004-20240419-en
Target
78952af2d03049bce0afae7bee348000_NEAS
Size
334KB
MD5
78952af2d03049bce0afae7bee348000
SHA1
a7fa2d0ff577e0af5d8a936a4e8e75e0df3bebe3
SHA256
644af3bb59eb08d8d85ab103617a094923f43206a4bff04021edea4f94de8b18
SHA512
914e9c7fe0e2eb68ed1e5495e4e8b60930002ad7036fd53d0e5d513f1775e9cbbc5b555cc823d0a23aca96ecda3fb3d5a3d33ad6f58032ece83de11d88742854
SSDEEP
6144:I1HTjHNBfHJrAtp1Z1eob4q8Za9zjRk+xVV54:a/HJrAtp1rJx8czlk+3V54
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
D:\a\netzilo-ztna\netzilo-ztna\Release\x64\afguard64.pdb
NtQueryInformationProcess
VerSetConditionMask
RtlCaptureContext
RtlLookupFunctionEntry
NtQueryVirtualMemory
NtFreeVirtualMemory
NtProtectVirtualMemory
NtAllocateVirtualMemory
NtOpenFile
NtWriteFile
NtReadFile
NtCreateFile
RtlVirtualUnwind
RtlPcToFileHeader
RtlUnwindEx
NtClose
GetProcAddress
LoadResource
LockResource
SizeofResource
FindResourceW
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
LoadLibraryW
GetCurrentThread
GetLastError
SetNamedPipeHandleState
WaitNamedPipeW
Sleep
ProcessIdToSessionId
SetLastError
ResumeThread
LocalFree
QueryFullProcessImageNameW
InitializeCriticalSectionEx
DeleteCriticalSection
TlsFree
GetModuleHandleW
GetModuleHandleA
FindResourceExW
VirtualFreeEx
VirtualAllocEx
OpenProcess
CreateThread
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
CreateEventW
WaitForSingleObject
GetProcessHeap
HeapSize
HeapFree
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
SetFilePointerEx
GetCPInfo
GetTimeZoneInformation
HeapReAlloc
HeapAlloc
HeapDestroy
CloseHandle
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
InitializeCriticalSectionAndSpinCount
EncodePointer
InterlockedFlushSList
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SleepConditionVariableSRW
WakeAllConditionVariable
WriteConsoleW
GetSystemTimeAsFileTime
QueryPerformanceCounter
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleFileNameW
LocalAlloc
MultiByteToWideChar
WideCharToMultiByte
ReleaseSRWLockExclusive
CreateFileW
QueryDosDeviceW
CheckRemoteDebuggerPresent
IsDebuggerPresent
VerifyVersionInfoW
OutputDebugStringW
VirtualProtect
SuspendThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualFree
VirtualQuery
VirtualProtectEx
VirtualQueryEx
FreeLibrary
LoadLibraryExA
LoadLibraryExW
RaiseException
EnterCriticalSection
LeaveCriticalSection
IsWindow
DestroyWindow
UpdateLayeredWindow
SetWindowPos
IsWindowVisible
IsZoomed
SetTimer
ReleaseDC
InvalidateRect
GetWindowRect
InflateRect
RegisterClassExW
GetWindowLongPtrW
SetWindowLongPtrW
GetClassNameW
SetWindowsHookExW
CallNextHookEx
MonitorFromRect
GetMonitorInfoW
KillTimer
SetClipboardData
GetClipboardData
SetWindowDisplayAffinity
GetMessageA
GetMessageW
CreateWindowExW
PostMessageW
GetWindowLongW
DefWindowProcW
GetDC
TranslateMessage
TrackPopupMenu
GetAsyncKeyState
PeekMessageW
PeekMessageA
DispatchMessageW
SelectObject
DeleteObject
CreateCompatibleDC
CommandLineToArgvW
GdipAlloc
GdipFree
GdiplusStartup
GdipCreatePath
GdipDeletePath
GdipAddPathString
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipCloneImage
GdipDisposeImage
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipCreateHBITMAPFromBitmap
GdipDeleteGraphics
GdipSetSmoothingMode
GdipSetTextRenderingHint
GdipDrawLineI
GdipDrawPath
GdipGraphicsClear
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdipDrawString
GdipMeasureString
SetEntriesInAclW
SetSecurityDescriptorSacl
SetSecurityDescriptorDacl
OpenProcessToken
AllocateAndInitializeSid
FreeSid
GetSidLengthRequired
GetTokenInformation
InitializeAcl
InitializeSecurityDescriptor
xexp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ