TraceView.pdb
Static task
static1
General
-
Target
70d164e2afb3be639d5f1100b2577740_NeikiAnalytics
-
Size
1.6MB
-
MD5
70d164e2afb3be639d5f1100b2577740
-
SHA1
5d7bd2a8a946e3cc35bd756562dfc12ee72c5a66
-
SHA256
c38fc0685fdaef91407d9331e52ee22fd867a046dde34453a224cf27fbaaf47d
-
SHA512
80720970067dd2ee7cad2e7b544808891d6b412bfa6227aca1cbc79a3468aa14b47ebae1c6218e0fe3e458428ef7292bf3c9e21fbc9a69acced21b1b0121ac72
-
SSDEEP
49152:GoQQQd1jVk8OWG2mWGsmWG2mWGVF1lVaTkhisGcnlQHPxi:eQQd152nlS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70d164e2afb3be639d5f1100b2577740_NeikiAnalytics
Files
-
70d164e2afb3be639d5f1100b2577740_NeikiAnalytics.exe windows:10 windows x86 arch:x86
d6283301022c5593fe614c3b8f321a03
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
OpenTraceW
ControlTraceW
CloseTrace
ProcessTrace
StartTraceW
EnableTrace
EnumerateTraceGuids
QueryAllTracesW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
ConvertSidToStringSidW
GetLengthSid
LookupAccountSidW
kernel32
CreateDirectoryW
RemoveDirectoryW
GetModuleHandleW
GetVersionExW
CompareStringOrdinal
LCMapStringEx
ReadFile
GetFileSizeEx
WriteFile
GetModuleFileNameW
SetEnvironmentVariableW
SetFilePointer
GetTempPathW
CreateFileW
FormatMessageW
OutputDebugStringW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCurrentDirectoryW
LocalFree
AllocConsole
DeleteFileW
GetFileSize
CreateFileMappingW
MapViewOfFileEx
WritePrivateProfileStringW
GetPrivateProfileSectionNamesW
GetPrivateProfileStringW
GetFileAttributesW
GetSystemInfo
MapViewOfFile
SetDllDirectoryW
GetDllDirectoryW
VirtualProtect
LoadLibraryExA
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
RaiseException
WaitForMultipleObjects
LoadLibraryW
SystemTimeToFileTime
GetCurrentProcessId
GlobalLock
ResetEvent
CloseHandle
GlobalFree
GlobalAlloc
TerminateThread
SetEvent
GetLastError
CreateMutexW
Sleep
GetExitCodeThread
CreateEventW
DuplicateHandle
ResumeThread
ReleaseMutex
WaitForSingleObject
UnmapViewOfFile
GetProcAddress
FreeLibrary
GetDateFormatW
GetFileTime
SearchPathW
CopyFileW
LoadLibraryExW
InitializeCriticalSection
SetLastError
LoadResource
FindResourceExW
LockResource
FreeResource
SizeofResource
LocalAlloc
FindClose
FindNextFileW
FindFirstFileExW
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
DecodePointer
EncodePointer
InitializeCriticalSectionEx
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStringTypeW
WideCharToMultiByte
MultiByteToWideChar
GetEnvironmentVariableA
GetEnvironmentVariableW
HeapDestroy
HeapReAlloc
HeapSize
GetCurrentProcess
CompareFileTime
GetProcessHeap
HeapAlloc
GlobalUnlock
HeapFree
VirtualQuery
gdi32
GetBkColor
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
RectVisible
TextOutW
Escape
ExtTextOutW
CreateRectRgn
GetCurrentObject
SelectObject
PatBlt
CreateSolidBrush
GetTextExtentPoint32W
GetObjectW
CreateFontIndirectW
PtVisible
user32
GetParent
GetDesktopWindow
GetClientRect
GetSysColor
ClientToScreen
SendMessageW
ScreenToClient
IsWindowVisible
GetDC
GetWindowRect
PostMessageW
LoadIconW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMessagePos
LoadMenuW
GetDlgItem
MoveWindow
GetTopWindow
IsWindow
GetWindow
GrayStringW
EnableMenuItem
KillTimer
CheckMenuItem
SetClipboardData
DrawFocusRect
EmptyClipboard
CloseClipboard
CopyRect
SetTimer
OpenClipboard
FillRect
GetFocus
GetCursorPos
GetDCEx
ReleaseCapture
PtInRect
SetRectEmpty
SetCursor
SetCapture
LockWindowUpdate
RedrawWindow
OffsetRect
GetSystemMetrics
InflateRect
GetSystemMenu
DrawTextW
SetScrollPos
UpdateWindow
BringWindowToTop
TabbedTextOutW
LoadCursorW
DrawFrameControl
InvalidateRect
ReleaseDC
PostThreadMessageW
TranslateMessage
DispatchMessageW
GetKeyState
GetWindowLongW
RegisterWindowMessageW
DrawEdge
FrameRect
EnableWindow
mfc42u
ord5830
ord2440
ord2036
ord1569
ord1836
ord682
ord4394
ord3591
ord6511
ord6608
ord2385
ord3614
ord268
ord1834
ord4500
ord810
ord3909
ord3995
ord4120
ord6004
ord3282
ord3298
ord3291
ord793
ord2106
ord6590
ord6504
ord6910
ord6605
ord823
ord3397
ord6051
ord4621
ord4073
ord1768
ord818
ord4401
ord5237
ord2377
ord2371
ord5157
ord6370
ord4347
ord5286
ord3793
ord5142
ord4688
ord4831
ord4435
ord2640
ord2047
ord6372
ord3744
ord5977
ord5059
ord6211
ord6193
ord3871
ord6195
ord1720
ord5257
ord2438
ord6437
ord2116
ord5273
ord2859
ord567
ord3133
ord3792
ord3016
ord5261
ord6048
ord1767
ord4419
ord5276
ord641
ord4992
ord4704
ord3014
ord2508
ord361
ord4224
ord1826
ord2505
ord293
ord925
ord800
ord5568
ord2910
ord4155
ord2810
ord2756
ord4199
ord5706
ord4124
ord940
ord858
ord861
ord540
ord535
ord538
ord4078
ord3658
ord1821
ord1919
ord825
ord656
ord3605
ord1794
ord4390
ord609
ord2567
ord2070
ord3569
ord4266
ord1933
ord2857
ord4989
ord4407
ord5233
ord4430
ord5248
ord2715
ord2382
ord5278
ord3054
ord5094
ord5097
ord4421
ord4072
ord674
ord4461
ord4298
ord3345
ord5006
ord2641
ord1658
ord975
ord5468
ord3398
ord2874
ord2873
ord4146
ord2084
ord366
ord1787
ord1941
ord640
ord2746
ord4195
ord323
ord2442
ord1633
ord2854
ord4369
ord4846
ord4237
ord4040
ord2225
ord4828
ord5061
ord4629
ord4601
ord4744
ord4602
ord5010
ord3494
ord2507
ord355
ord2977
ord3142
ord3254
ord4459
ord3131
ord3257
ord2980
ord3076
ord2971
ord3825
ord3826
ord3820
ord3074
ord4075
ord4418
ord834
ord4392
ord616
ord2403
ord2015
ord4213
ord2570
ord2072
ord3577
ord1560
ord4270
ord2406
ord1634
ord2855
ord3621
ord3292
ord6451
ord6330
ord4370
ord4847
ord2506
ord324
ord2538
ord291
ord6390
ord5446
ord6379
ord5436
ord686
ord2089
ord384
ord2294
ord6928
ord795
ord3716
ord1808
ord4215
ord2576
ord6266
ord1637
ord2858
ord2430
ord3649
ord1143
ord1165
ord4229
ord3737
ord755
ord470
ord1230
ord2634
ord3087
ord2637
ord801
ord541
ord1105
ord1184
ord2836
ord2099
ord4294
ord2776
ord2755
ord941
ord942
ord2606
ord537
ord1172
ord6874
ord772
ord5602
ord5856
ord500
ord3365
ord4396
ord693
ord2574
ord3991
ord6895
ord6688
ord6670
ord3297
ord3288
ord2092
ord3635
ord283
ord3568
ord1989
ord5188
ord798
ord6403
ord533
ord1197
ord2644
ord1662
ord6331
ord3490
ord3084
ord4279
ord2078
ord5679
ord536
ord1795
ord816
ord562
ord6205
ord2992
ord2559
ord3215
ord5147
ord2673
ord6150
ord6365
ord2522
ord5230
ord5244
ord5275
ord4358
ord2436
ord4051
ord5467
ord4116
ord2381
ord620
ord1702
ord4071
ord3098
ord5867
ord298
ord4225
ord5857
ord922
ord4238
ord3993
ord6898
ord3296
ord1840
ord702
ord400
ord4253
ord1761
ord1899
ord2081
ord6754
ord6896
ord5283
ord4829
ord768
ord5155
ord5156
ord5154
ord4899
ord4736
ord4970
ord4371
ord4848
ord4942
ord4352
ord489
ord2773
ord2762
ord3173
ord668
ord356
ord2813
ord3806
ord2486
ord3281
ord2618
ord6720
ord4425
ord2046
ord4709
ord4433
ord1683
ord5284
ord771
ord2638
ord1008
ord2520
ord5846
ord496
ord4254
ord1900
ord2057
ord3785
ord2356
ord2289
ord1106
ord2388
ord817
ord3341
ord5296
ord5299
ord4074
ord4693
ord5303
ord5285
ord5711
ord565
ord807
ord554
ord4584
ord4451
ord2619
ord796
ord5996
ord2109
ord529
ord491
ord4221
ord1940
ord4616
ord6373
ord4050
ord1775
ord4272
ord1615
ord6003
ord4269
ord815
ord5298
ord4692
ord5710
ord2717
ord3948
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord5193
ord561
ord3733
ord3592
ord1131
ord1196
ord1202
ord4803
ord1972
ord2362
ord4395
ord692
ord1764
ord6362
ord2405
ord2016
ord4214
ord2573
ord3798
ord3634
ord924
ord860
ord6772
ord5597
ord542
ord2631
ord472
ord3688
ord5047
ord6238
ord6646
ord4128
ord4292
ord5777
ord5871
ord5784
ord3701
ord3747
ord6124
ord859
ord4119
ord2091
ord783
ord2104
ord3706
ord3566
ord5781
ord2966
ord5755
ord6188
ord6190
ord5752
ord6182
ord4324
ord6185
ord6017
ord6168
ord5869
ord5785
ord5790
ord5674
ord5732
ord5575
ord5567
ord6057
ord5860
msvcrt
_XcptFilter
__p__commode
_amsg_exit
__wgetmainargs
__set_app_type
_exit
_cexit
__p__fmode
__setusermatherr
_initterm
_wcmdln
__dllonexit
_wsetlocale
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_except_handler4_common
_controlfp
__crtLCMapStringW
memchr
__crtCompareStringW
_wcsdup
memset
_ismbblead
___mb_cur_max_func
memcmp
_ftol2
strtoul
strtok_s
_splitpath_s
strrchr
___lc_codepage_func
___lc_handle_func
__pctype_func
setlocale
___lc_collate_cp_func
_unlock
_lock
memmove
abort
sprintf_s
strstr
printf
strcpy_s
fgets
_vscprintf
fprintf
strncpy_s
vfprintf
fopen
vsprintf_s
strncmp
_vsnprintf
memcpy
_CxxThrowException
??0exception@@QAE@ABQBDH@Z
calloc
memmove_s
wcsrchr
memcpy_s
_wtempnam
strchr
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
realloc
towlower
??0bad_cast@@QAE@ABV0@@Z
??0bad_cast@@QAE@PBD@Z
??1bad_cast@@UAE@XZ
_wtol
strnlen
wcstoul
malloc
vfwprintf
__wargv
_wfullpath
fputs
_errno
swprintf_s
fwrite
_wfreopen
_vsnwprintf_s
_getch
fputws
_wsplitpath_s
_wmakepath_s
_wcsicmp
__argc
_wfsopen
exit
wprintf
free
fgetws
wcsstr
_wfopen
fclose
wcsncpy_s
wcscat_s
wcscpy_s
??_V@YAXPAX@Z
_purecall
_wtoi
__CxxFrameHandler3
_onexit
__iob_func
fputwc
_snwprintf_s
wcscspn
wcsnlen
_vsnwprintf
wcsspn
wcschr
iswspace
wcstok_s
wcstol
swscanf
comctl32
ImageList_GetBkColor
ord17
ImageList_DrawEx
ImageList_Draw
ImageList_GetImageInfo
ImageList_SetBkColor
ImageList_GetIconSize
ole32
CoCreateInstance
CoTaskMemFree
CoCreateGuid
CoUninitialize
IIDFromString
CoInitializeEx
oleaut32
VariantClear
SysAllocString
SysFreeString
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteW
SHGetMalloc
imagehlp
SymSetOptions
SymInitialize
SymGetLineFromAddr64
SymGetTypeInfo
SymGetSymbolFile
SymGetOptions
SymEnumTypesByName
SymRegisterCallback64
SymCleanup
SymFromAddr
SymFindFileInPath
MakeSureDirectoryPathExists
SymUnloadModule64
tdh
TdhGetEventInformation
TdhGetEventMapInformation
TdhLoadManifest
TdhEnumerateProviders
ntdll
RtlIpv4AddressToStringExW
RtlNtStatusToDosError
NtReadFile
NtSetInformationFile
NtWriteFile
RtlIpv6AddressToStringExW
Sections
.text Size: 827KB - Virtual size: 826KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 628KB - Virtual size: 632KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE