Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
d5abd0365cea4d252a16bf1babeaec50_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d5abd0365cea4d252a16bf1babeaec50_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Target
d5abd0365cea4d252a16bf1babeaec50_NeikiAnalytics
Size
240KB
MD5
d5abd0365cea4d252a16bf1babeaec50
SHA1
1aa425c71a8a1313048fd635a86a4d3d33141f97
SHA256
1209b688931f309250fad655b7a2131991a8f1e4f73f90526fc3bc230cb1ffef
SHA512
a08d50a728aedb5ea307d609f424454dfc0fffbba9af1f176612f4cd696fbbb00a96d57beb080349e9e6e86fb2a73102068636c4a99eecc1374aa2592250eb7f
SSDEEP
6144:huOYYecObhLvkiL2XOdldJNifl4wwXCAjVrUEzvbeTIu//:EK1y9hrTiN4nBRrUS6Tf/
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreatePipe
GlobalGetAtomNameA
RaiseException
GetSystemDefaultLangID
lstrcmpA
lstrcpy
GetModuleFileNameW
lstrlenW
GetLogicalDrives
GetNumberFormatW
GetCurrentDirectoryA
DosDateTimeToFileTime
GetTempFileNameA
GetWindowsDirectoryA
ExitThread
GetSystemDirectoryW
GetSystemInfo
SetEvent
GetDateFormatA
GetFileTime
GetMailslotInfo
VirtualAlloc
GetNamedPipeInfo
ExpandEnvironmentStringsA
GlobalFindAtomW
GlobalAlloc
FindResourceA
GetCurrentDirectoryW
DeleteAtom
GetLocaleInfoW
GetDateFormatW
LoadLibraryA
MoveFileA
GetMenuItemInfoW
CreateDesktopA
GetParent
LoadMenuW
CreateDialogParamA
GetDlgItemTextA
DialogBoxIndirectParamA
GetFocus
CreateDialogIndirectParamA
GetWindowTextA
GetMenuItemRect
GetClassInfoExA
CascadeWindows
GetMessageA
WaitForInputIdle
PeekMessageA
CharNextW
UpdateWindow
GetWindowRect
GetCapture
GetFontData
CreateCompatibleBitmap
SetPixel
EnumFontFamiliesW
UpdateICMRegKeyW
GetCharWidthW
GetTextExtentExPointI
GetTextCharacterExtra
GetMapMode
GetTextAlign
RegOpenKeyExW
RegSaveKeyA
RegDeleteValueA
RegQueryValueA
RegQueryInfoKeyA
RegQueryValueW
SHBrowseForFolder
SHFreeNameMappings
StrNCmpIA
StrChrA
StrRStrIA
SetupSetPlatformPathOverrideW
SetupSetDirectoryIdExA
CertAddEncodedCRLToStore
CryptSIPCreateIndirectData
CryptGetDefaultOIDDllList
CertDeleteCRLFromStore
CertAddCertificateContextToStore
CertUnregisterPhysicalStore
I_CertSrvProtectFunction
I_CryptInstallAsn1Module
I_CryptFlushLruCache
CertSetCertificateContextProperty
RegOpenKeyExU
RegDeleteValueU
CertVerifyCTLUsage
CertFindCTLInStore
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ