E3DLLFunc
MAP_Import
__DebuggerHookData
Static task
static1
Behavioral task
behavioral1
Sample
e49730a3e0c3c8c80e6a99b1acd06270_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e49730a3e0c3c8c80e6a99b1acd06270_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
Target
e49730a3e0c3c8c80e6a99b1acd06270_NeikiAnalytics
Size
16KB
MD5
e49730a3e0c3c8c80e6a99b1acd06270
SHA1
663ee47ec0114ac2afce1b7576b6d6d67a85423d
SHA256
1234c10637103e8e59df0c21840d773df738663488baa4125ecd968e3a59352c
SHA512
8f7722474f63a7d5d744e94e895814dd278d55213d38e7e7a4135d7d799b30953ad5e59f24b1f7c794d1270856ceafb4b7e41f28adfa70a4c9e5ce8c5f3f67c1
SSDEEP
192:0dtnN6CCbazU9a2D5GSw/BvPRQX8zJJwdnZjzJ6FEFaXy8qIVj93j5lyzv:G6C3Qp50jTrIRGXy8qIj390z
Checks for missing Authenticode signature.
resource |
---|
e49730a3e0c3c8c80e6a99b1acd06270_NeikiAnalytics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetVersion
LocalAlloc
LocalFree
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
@$bdele$qpv
@$bnwa$qui
@_CatchCleanup$qv
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__ErrorMessage
__ExceptionHandler
___debuggerDisableTerminateCallback
__flushall
__free_heaps
__ftol
__startupd
_abort
_atof
_atol
_cos
_fabs
_floor
_free
_malloc
_memcpy
_memset
_sin
_sprintf
_sqrt
_stricmp
_strnicmp
E3DLLFunc
MAP_Import
__DebuggerHookData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ