DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
d8d7b4960016e75a1bc46a3e47b97740_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d8d7b4960016e75a1bc46a3e47b97740_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
d8d7b4960016e75a1bc46a3e47b97740_NeikiAnalytics
Size
88KB
MD5
d8d7b4960016e75a1bc46a3e47b97740
SHA1
32f8e640bd9c6e33f125e1730495d76ea800124d
SHA256
4ccabda98d444abdf3dd31354650c669bc9ad6d65d4bcc75cceb7362ccf26435
SHA512
a85eabe4a2b1f92581d4dc41a02365e2ad7c29fa5057bd8e48a7888609168d8c132131d759deb32a24c73da1343520a106d16e83e1170bf14107d368b6380b2d
SSDEEP
768:IDq6AW90h1DJKpoJjxSQr6euJO7z2o1ESy:rJx1Ge32sESy
Checks for missing Authenticode signature.
resource |
---|
d8d7b4960016e75a1bc46a3e47b97740_NeikiAnalytics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
WindowsGetStringRawBuffer
DisableThreadLibraryCalls
GetModuleHandleW
GetProcAddress
GetTickCount
HeapAlloc
HeapReAlloc
IsBadStringPtrW
QueryPerformanceCounter
QueryPerformanceFrequency
_vsnprintf
__acrt_iob_func
__stdio_common_vsprintf
_strdup
free
fwrite
getenv
memcmp
memmove
strchr
strcmp
strcspn
strlen
wcscmp
DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ