Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
d2b6a0e268878c95a094538624179170_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d2b6a0e268878c95a094538624179170_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
d2b6a0e268878c95a094538624179170_NeikiAnalytics
Size
125KB
MD5
d2b6a0e268878c95a094538624179170
SHA1
4ce59baa5b823005e77b24031caf56da4b1a8e98
SHA256
d856a1843746d44f4079cdd8f97f9fbbdaa44a7ffedaa7b17a6b45d39aa39448
SHA512
d71781743ade2ceafa4ea42ee84ee61f48caffc2dfa3ab6a2ddd68d80489d017c045e350539b7026c0c7bbb913d1788a3aa9cf5485511607ab60fbb0707c53eb
SSDEEP
3072:qE8Xugr6SSwewBpZb9kj4CgLIWsxIny1Ij1xZENPEUu6T:M6w1pXkj4CgLIWsxIZjfZUPfz
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
System.Windows.Input.Manipulations.ni.pdb
/_/artifacts/obj/System.Windows.Input.Manipulations/x64/Release/net6.0/System.Windows.Input.Manipulations.pdb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ