CreateShadowPlayProxyShimInterface
QueryShadowPlayDdiShimInterface
QueryShadowPlayDdiShimStatus
Static task
static1
Behavioral task
behavioral1
Sample
14d98839f357d93a2b63f51110162660_NeikiAnalytics.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
14d98839f357d93a2b63f51110162660_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
Target
14d98839f357d93a2b63f51110162660_NeikiAnalytics
Size
2.2MB
MD5
14d98839f357d93a2b63f51110162660
SHA1
9a34bdbfe61764d17164547ee13bafef8d49a73c
SHA256
98f88c7bcbcccbebbb88381bf59696b4187a6d93f35fc582f3e1c045dc1c5d1f
SHA512
b062bf804c06211ad2df32c115b3ea3c5c8fb5770560af6ef364a4468d51ba5f2d3c9a1c7b7a1390d3072cba140a875c3abf997bc01c0be92cdd9c327566b25e
SSDEEP
49152:yPofOdoADbyaSUceDAvwfeOAy9iZztpPGWwBRm39:Co2DSHeXAy9iZztpPGWwBRm
Checks for missing Authenticode signature.
resource |
---|
14d98839f357d93a2b63f51110162660_NeikiAnalytics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHGetFolderPathW
SHGetKnownFolderPath
SHGetFolderPathA
CoTaskMemFree
OpenProcessToken
GetLengthSid
GetTokenInformation
CopySid
RegGetValueW
RegCreateKeyExW
SetThreadToken
OpenThreadToken
AllocateAndInitializeSid
CreateRestrictedToken
CreateWellKnownSid
FreeSid
GetSecurityDescriptorDacl
ImpersonateSelf
InitializeSecurityDescriptor
RevertToSelf
SetSecurityDescriptorDacl
GetUserNameA
GetUserNameW
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
SetEntriesInAclA
LoadStringW
GetWindow
GetDC
GetWindowTextW
IsWindowVisible
GetWindowDisplayAffinity
GetRegisteredRawInputDevices
RegisterRawInputDevices
EnumChildWindows
EnumWindows
GetShellWindow
FindWindowExW
FindWindowExA
SetWindowLongA
ClipCursor
MapVirtualKeyA
SendInput
GetAsyncKeyState
DestroyWindow
CreateWindowExA
RegisterClassExA
UnregisterClassA
DefWindowProcA
GetRawInputData
PostMessageA
SendNotifyMessageA
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
FindWindowA
GetWindowLongA
SetForegroundWindow
GetForegroundWindow
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
GetCursorInfo
IsProcessDPIAware
SystemParametersInfoA
EnumDisplaySettingsA
GetWindowThreadProcessId
WindowFromPhysicalPoint
GetPhysicalCursorPos
SetCursor
ShowCursor
RedrawWindow
IsWindow
AttachThreadInput
PostThreadMessageA
GetDesktopWindow
GetWindowRect
GetSystemMetrics
LoadBitmapA
ReleaseDC
PathFileExistsA
PathFindFileNameA
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
SetStdHandle
SetFilePointerEx
HeapSize
SetEnvironmentVariableW
GetConsoleCP
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetTimeZoneInformation
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
SetConsoleCtrlHandler
ExitProcess
WriteConsoleW
GetModuleHandleExW
GetFileType
GetStdHandle
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwind
GetConsoleMode
ReadConsoleW
FreeEnvironmentStringsW
lstrcmpA
InitializeSListHead
TerminateProcess
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
WaitForSingleObjectEx
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
InitializeCriticalSectionAndSpinCount
FormatMessageW
OpenFileMappingW
CreateFileMappingW
OpenEventW
CreateEventW
OpenMutexW
CreateMutexW
CreateNamedPipeA
CreateFileMappingA
OpenMutexA
GetCurrentProcessId
GetModuleFileNameA
CloseHandle
GetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
InitializeCriticalSection
DeleteCriticalSection
OpenProcess
FreeLibrary
GetModuleFileNameW
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32First
Process32Next
GetSystemDirectoryA
GetSystemDirectoryW
GetModuleHandleA
VerSetConditionMask
ExpandEnvironmentStringsW
CreateFileW
GetFileAttributesW
GetFullPathNameW
OutputDebugStringW
SetLastError
GetCurrentProcess
CreateProcessA
CreateProcessW
GetModuleHandleW
LoadLibraryExW
LocalAlloc
LocalFree
SetEndOfFile
lstrcmpW
VerifyVersionInfoW
FileTimeToSystemTime
EnterCriticalSection
LeaveCriticalSection
CreateDirectoryA
GetModuleHandleExA
CreateFileA
DeleteFileA
GetFileAttributesA
GetFileSizeEx
GetFinalPathNameByHandleA
WriteFile
OutputDebugStringA
GetCurrentThread
GetCurrentThreadId
GetLocalTime
CopyFileA
MoveFileExA
SetEvent
ResetEvent
WaitForSingleObject
CreateEventA
CreateThread
GetThreadId
Thread32First
Thread32Next
Process32FirstW
Process32NextW
QueryFullProcessImageNameA
K32GetProcessImageFileNameA
GetErrorMode
SetErrorMode
InitOnceExecuteOnce
GetTickCount64
GetTickCount
ReadFile
DecodePointer
RaiseException
InitializeCriticalSectionEx
WaitForMultipleObjects
Sleep
FlushFileBuffers
DisconnectNamedPipe
ReleaseMutex
UnmapViewOfFile
OpenFileMappingA
ConnectNamedPipe
HeapAlloc
HeapFree
GetProcessHeap
CreateMutexA
OpenEventA
MapViewOfFile
CreateShadowPlayProxyShimInterface
QueryShadowPlayDdiShimInterface
QueryShadowPlayDdiShimStatus
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ