Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
054a62ed4fb5eec44afcc2344e9a5570_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
054a62ed4fb5eec44afcc2344e9a5570_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Target
054a62ed4fb5eec44afcc2344e9a5570_NeikiAnalytics
Size
1.5MB
MD5
054a62ed4fb5eec44afcc2344e9a5570
SHA1
e2284358b880753a48b79f4395c6003d431d97c7
SHA256
3c9285bfd24dd9cbd5f5afeec8a881883bcd8a548c16bb73881bdc8f72638327
SHA512
29bb519d817bb4b774bd32fcf5f9e04d80628011fe4cc34ef440430cfbe54ca2992f5dbdfe4b6d95934a99d466973e29d6e5231b79fc4080ae9b0ebd4cca4a5d
SSDEEP
24576:YcQGyqHPj3c/cTSyq1zFXFdFVLWyqW90Rli2QYM2ps1d8yH4bK5:YcQGyqHPj3cUTSd1zfDlWyqW9ei2QYM1
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\ent-slave-root\workspace\VNCConnect\Builds\Clients\VNC_7.11.x\label\con-windows-64\bld64\RelWithDebInfo\vnclicense.pdb
accept
gethostname
WSAGetLastError
gethostbyaddr
gethostbyname
bind
WSASetLastError
getservbyname
getservbyport
ntohs
ntohl
inet_addr
htons
htonl
getsockname
getpeername
WSASocketW
WSADuplicateSocketW
WSAConnect
WSAStartup
socket
setsockopt
getsockopt
ioctlsocket
closesocket
inet_ntoa
GetFileAttributesW
GetFileAttributesExW
RemoveDirectoryW
SetEndOfFile
SetFilePointer
SetLastError
MoveFileW
ExpandEnvironmentStringsW
LoadResource
LockResource
SizeofResource
FindResourceW
CreateFileW
GetFileInformationByHandle
GetCurrentProcessId
FindClose
FindFirstFileW
FindNextFileW
SetErrorMode
OpenProcess
SetStdHandle
OutputDebugStringW
SearchPathW
GetModuleFileNameW
QueryFullProcessImageNameW
GetLocaleInfoW
GetUserDefaultLCID
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
GetFileType
AllocConsole
FreeConsole
GetConsoleMode
ReadConsoleW
WriteConsoleW
FormatMessageW
MultiByteToWideChar
WideCharToMultiByte
GetVersionExW
DeleteFileW
GetTimeZoneInformation
LocalAlloc
ReOpenFile
SetEvent
ResetEvent
CreateEventW
RtlCaptureStackBackTrace
GetModuleHandleExW
GetHandleInformation
SetHandleInformation
GetSystemDirectoryW
FreeLibrary
LoadLibraryW
GetComputerNameW
GetSystemInfo
GetTimeFormatW
GetDateFormatW
WaitForMultipleObjects
GetSystemDirectoryA
LoadLibraryA
ReadFile
GetOverlappedResult
CancelIo
WaitForSingleObject
RtlUnwind
WriteFile
DuplicateHandle
GetCommandLineA
ExitProcess
LoadLibraryExW
EncodePointer
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
GetCurrentThreadId
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
GetModuleHandleW
GetSystemTimeAsFileTime
Sleep
QueryPerformanceFrequency
QueryPerformanceCounter
GetCommandLineW
LocalFree
GetCurrentProcess
GetLastError
CloseHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetCurrentThread
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
IsValidLocale
EnumSystemLocalesW
SetConsoleCtrlHandler
GetConsoleOutputCP
GetFileSizeEx
SetFilePointerEx
SetEnvironmentVariableW
HeapReAlloc
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetStringTypeW
HeapSize
VirtualProtect
VirtualQuery
LoadLibraryExA
SystemTimeToTzSpecificLocalTime
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetSystemMetrics
PeekMessageW
MsgWaitForMultipleObjects
SHGetKnownFolderPath
SHFileOperationW
CoUninitialize
CoInitializeEx
CoTaskMemFree
CoCreateInstance
SysAllocString
SysFreeString
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
GetUserNameW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
SetSecurityDescriptorSacl
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
SetSecurityDescriptorControl
MakeSelfRelativeSD
MakeAbsoluteSD
InitializeSecurityDescriptor
GetSecurityDescriptorLength
GetSecurityDescriptorControl
SetEntriesInAclW
InitializeAcl
GetAclInformation
SetSecurityInfo
GetSecurityInfo
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyExW
RegCreateKeyExW
RegCloseKey
ConvertStringSidToSidW
ConvertSidToStringSidW
LookupAccountNameW
LookupAccountSidW
IsValidSid
GetTokenInformation
GetSidIdentifierAuthority
GetLengthSid
FreeSid
EqualSid
CopySid
AllocateAndInitializeSid
OpenProcessToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ