Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
c0c4d585a6555ae8f75e128399e39f70_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c0c4d585a6555ae8f75e128399e39f70_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Target
c0c4d585a6555ae8f75e128399e39f70_NeikiAnalytics
Size
960KB
MD5
c0c4d585a6555ae8f75e128399e39f70
SHA1
c2eaa182d00c95f2e6eb57b1c66ade7df19529d0
SHA256
ed85b176d34de6def85b22a61fae21555172c356a16b2995b42207fb8d7b8eed
SHA512
5b65545302d503fa50868de7288c308998b8809a8961cc54932d680954621eb85dbb93ba4e2adb37c4530ae863c00b744a8fd0cfd444006ab04de7c9bfc6feea
SSDEEP
24576:r991k8S/Sh0J4rUUuqYaUkv1hF5kinffU0NcgXkYiux:x0XqYaDv5ainfcLgXdiu
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\cygwin\home\scmpf\compiler_src\zhouxiao02_1242382_win32\0\app\gensoft\ime-jp\baiduime\out\BaiduPlatform.pdb
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
PathFindFileNameW
htonl
ImmDisableIME
ImmGetIMEFileNameW
TerminateProcess
LocalAlloc
WideCharToMultiByte
MultiByteToWideChar
ConnectNamedPipe
CreateNamedPipeW
WaitNamedPipeW
WriteFile
ReadFile
CreateFileW
GetOverlappedResult
DisconnectNamedPipe
WaitForMultipleObjects
CancelIo
GetPrivateProfileStringW
WritePrivateProfileStringW
HeapAlloc
HeapFree
GetProcessHeap
AreFileApisANSI
GetTempPathW
ResetEvent
GlobalFindAtomW
GlobalAddAtomW
GetSystemTime
VerSetConditionMask
VerifyVersionInfoW
GetLocalTime
DeleteFileW
GetPrivateProfileSectionW
GetFileSize
MoveFileW
GetPrivateProfileIntW
SetFilePointer
InterlockedExchange
SystemTimeToFileTime
CreateProcessW
WTSGetActiveConsoleSessionId
OpenProcess
Process32NextW
ProcessIdToSessionId
Process32FirstW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
UnmapViewOfFile
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
MapViewOfFile
CreateFileMappingW
VirtualProtect
GetVersionExW
IsWow64Process
HeapCreate
AddVectoredExceptionHandler
SetUnhandledExceptionFilter
RemoveVectoredExceptionHandler
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetCurrentProcess
GetTickCount
QueryPerformanceCounter
CreateTimerQueueTimer
DeleteTimerQueueEx
CreateTimerQueue
OpenEventW
CreateEventW
SetEvent
WaitForSingleObject
CreateMutexW
GetLastError
RaiseException
GetModuleHandleA
FindNextFileW
FindClose
GetModuleHandleW
FindFirstFileW
GetCurrentProcessId
GetCurrentThreadId
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
LocalFree
GetProcAddress
LoadLibraryW
FreeLibrary
InterlockedCompareExchange
GetModuleFileNameW
CloseHandle
Sleep
GetCommandLineW
GetSystemDirectoryW
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
LoadLibraryA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentThread
ExitThread
CreateThread
DeleteFileA
GetTempPathA
GetVersionExA
GetFileAttributesExW
GetSystemInfo
GetDiskFreeSpaceA
GetDiskFreeSpaceW
LockFileEx
HeapValidate
GetFileAttributesA
FormatMessageA
UnlockFileEx
LockFile
UnlockFile
GetFullPathNameA
GetFullPathNameW
ReleaseMutex
OpenFileMappingW
OpenMutexW
VirtualQuery
FormatMessageW
IsValidCodePage
GetOEMCP
GetACP
SetEndOfFile
SetStdHandle
GetTimeZoneInformation
GetStringTypeA
HeapSize
InterlockedIncrement
InterlockedDecrement
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetSystemTimeAsFileTime
HeapReAlloc
GetFileType
RtlUnwind
GetFileAttributesW
LCMapStringW
LCMapStringA
GetStringTypeW
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
VirtualFree
VirtualAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetKeyboardLayoutList
SystemParametersInfoW
wsprintfW
CreateProcessAsUserW
RegQueryValueExW
RevertToSelf
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ConvertSidToStringSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
DuplicateTokenEx
SetTokenInformation
GetTokenInformation
OpenThreadToken
OpenProcessToken
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
ord165
SHCreateDirectoryExW
SHGetFolderPathW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
DestroyEnvironmentBlock
CreateEnvironmentBlock
WTSEnumerateSessionsW
WTSQueryUserToken
WTSFreeMemory
timeGetTime
WinHttpQueryHeaders
WinHttpReadData
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpConnect
WinHttpSetOption
WinHttpOpen
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSetStatusCallback
WinHttpCrackUrl
WinHttpCloseHandle
HttpOpenRequestW
HttpQueryInfoW
InternetSetOptionW
InternetCloseHandle
InternetCreateUrlA
InternetOpenW
HttpSendRequestW
InternetConnectW
InternetCrackUrlW
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ