Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
7a457655c303636df512657ad0ee3420_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7a457655c303636df512657ad0ee3420_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Target
7a457655c303636df512657ad0ee3420_NeikiAnalytics.exe
Size
3.6MB
MD5
7a457655c303636df512657ad0ee3420
SHA1
303d29bfb832d5a996f019c9876c745a434a38a3
SHA256
c622d88e700eeda8dba4b27d0712a765f5e25af385e36696c75936d96e400769
SHA512
072d9cda4d4a99261390e27eebb26ef99cd7ff6a316ff29c177eac3b567c371d446e281c3e489bdb841060d8540d305a8e0eded92a2ff0992d5ba526300db823
SSDEEP
49152:LiA3v32fjIqdLl8/WlRLuJwn/5I0a1fsTkW5CSHc8y8cXKk6VX3ECo:LLv32fnLSma1CW8HcXh0S
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\work\SE5\360se5\branches\se5_errpage\bin\360SE.pdb
lstrlenA
InterlockedIncrement
GetSystemTimeAsFileTime
GetSystemInfo
CreateEventW
SetEvent
WaitForSingleObject
Sleep
IsBadReadPtr
IsBadWritePtr
TlsSetValue
GetTickCount
WaitForMultipleObjects
CancelWaitableTimer
ResetEvent
GetTempPathW
GetTempFileNameW
CreateWaitableTimerW
SetWaitableTimer
GetDiskFreeSpaceExW
SetEndOfFile
TlsAlloc
TlsFree
DeleteFileW
GetModuleFileNameW
GetShortPathNameW
FindFirstFileW
GetFileAttributesW
SetFileAttributesW
RemoveDirectoryW
FindNextFileW
FindClose
GetUserDefaultLangID
FileTimeToSystemTime
FileTimeToLocalFileTime
FindResourceW
LoadResource
SizeofResource
LockResource
FreeResource
LocalFree
GetFileAttributesExW
CopyFileW
GetSystemTime
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
LocalAlloc
GlobalFree
OpenProcess
GetVersionExW
GetModuleHandleA
SetProcessWorkingSetSize
ExitProcess
TerminateProcess
GetPrivateProfileStringW
GetWindowsDirectoryW
MoveFileExW
GetFileTime
SetErrorMode
LoadLibraryExW
HeapAlloc
GetProcessHeap
HeapFree
GetProcessTimes
GlobalAddAtomW
GlobalDeleteAtom
GetSystemDirectoryW
RaiseException
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
VirtualFreeEx
SetThreadPriority
GetSystemDefaultLangID
GetPrivateProfileIntW
SetCurrentDirectoryW
TlsGetValue
OutputDebugStringW
GetCommandLineW
CreateMutexW
OpenThread
WritePrivateProfileStringW
OpenFileMappingW
GetExitCodeProcess
TerminateThread
GetLocalTime
DeviceIoControl
CreateRemoteThread
CreateThread
lstrcpyW
lstrcatW
OpenEventW
GlobalSize
lstrcmpA
SetPriorityClass
GetVersion
EnumResourceLanguagesW
lstrcpynW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LoadLibraryExA
lstrcmpiA
ExpandEnvironmentStringsW
HeapCreate
DeleteCriticalSection
CompareStringW
lstrcmpW
HeapReAlloc
FormatMessageW
MoveFileW
lstrcmpiW
OpenMutexW
GetPrivateProfileStringA
CompareFileTime
FindResourceExW
DebugBreak
lstrlenW
InterlockedDecrement
LoadLibraryW
SetFileTime
CreateDirectoryW
IsProcessorFeaturePresent
SetEnvironmentVariableA
CompareStringA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetStdHandle
LCMapStringA
LCMapStringW
HeapSize
GetConsoleMode
GetConsoleCP
SetHandleCount
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
HeapDestroy
RtlUnwind
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
ExitThread
InterlockedExchange
GetCurrentDirectoryW
SystemTimeToFileTime
GetFileType
DuplicateHandle
MultiByteToWideChar
WideCharToMultiByte
CreateFileW
ReadFile
VirtualFree
LoadLibraryA
GetProcAddress
GetModuleHandleW
FreeLibrary
CloseHandle
CreateFileMappingW
WriteFile
UnmapViewOfFile
MapViewOfFile
SetFilePointer
GetFileSize
SetLastError
SuspendThread
GetCurrentThreadId
VirtualProtect
VirtualAlloc
FlushInstructionCache
GetCurrentThread
InterlockedCompareExchange
GetCurrentProcess
VirtualQuery
SetThreadContext
GetThreadContext
DisableThreadLibraryCalls
ResumeThread
WriteProcessMemory
VirtualAllocEx
GetLastError
ReadProcessMemory
VirtualQueryEx
GetLongPathNameW
CreateProcessW
GetMenuItemRect
MenuItemFromPoint
CallNextHookEx
SetWindowsHookExW
UnhookWindowsHookEx
GetWindowPlacement
SetWindowPlacement
SendNotifyMessageW
RedrawWindow
GetWindowRgn
IsMenu
MonitorFromRect
UpdateLayeredWindow
GetDoubleClickTime
IntersectRect
GetActiveWindow
PrintWindow
InvalidateRgn
GetWindowTextLengthW
SetLayeredWindowAttributes
EnumWindows
MsgWaitForMultipleObjects
AllowSetForegroundWindow
LoadIconW
GetFocus
EndMenu
IsChild
GetWindowLongW
IsZoomed
TrackMouseEvent
SetWindowLongW
SendMessageCallbackW
RegisterClassExW
GetClassInfoExW
DestroyWindow
CreateWindowExW
GetClientRect
GetWindow
SetCapture
SetMessageExtraInfo
GetMenuInfo
SetTimer
GetMenu
DestroyMenu
ClientToScreen
InsertMenuW
CreatePopupMenu
SetCursor
LoadCursorW
PtInRect
ReleaseCapture
WindowFromPoint
GetCursorPos
GetKeyState
IsWindowVisible
InflateRect
EndPaint
BeginPaint
DefWindowProcW
LoadImageW
DrawIconEx
RegisterClipboardFormatW
CharLowerW
WaitForInputIdle
EqualRect
LockSetForegroundWindow
IsWindowEnabled
SetFocus
SetWindowRgn
InSendMessageEx
SetPropW
SetParent
EnumThreadWindows
GetWindowTextW
CharLowerA
GetAncestor
IsDlgButtonChecked
EndDialog
DrawIcon
MapWindowPoints
CheckDlgButton
GetDlgItem
SetDlgItemTextW
SetMenuInfo
GetSysColor
GetMenuItemID
GetMenuState
GetMenuItemInfoW
EnableMenuItem
MoveWindow
IsHungAppWindow
SetWindowTextW
wsprintfW
InsertMenuItemW
CheckMenuItem
DeleteMenu
GetMenuStringW
GetGUIThreadInfo
GetSubMenu
LoadMenuW
GetDlgItemTextW
keybd_event
SetMenuItemInfoW
GetKeyboardLayout
ActivateKeyboardLayout
RemovePropW
UpdateWindow
MessageBoxIndirectW
CreateWindowExA
TrackPopupMenuEx
TrackPopupMenu
CreateDialogIndirectParamW
RegisterWindowMessageW
LoadStringA
GetPropW
GetWindowDC
RemoveMenu
GetMenuItemCount
SystemParametersInfoW
GetMessageW
CallWindowProcW
TranslateAcceleratorW
DestroyAcceleratorTable
CopyAcceleratorTableW
CreateAcceleratorTableW
LoadAcceleratorsW
SetActiveWindow
EnableWindow
KillTimer
ReplyMessage
DialogBoxParamW
MessageBoxW
wvsprintfW
CharNextW
CharNextA
GetParent
GetWindowRect
SetWindowPos
UnregisterHotKey
RegisterHotKey
SendMessageTimeoutW
GetClassNameW
IsWindow
SubtractRect
PostQuitMessage
InvalidateRect
FindWindowExW
DispatchMessageW
TranslateMessage
PeekMessageW
SendMessageW
IsIconic
AttachThreadInput
GetWindowThreadProcessId
GetForegroundWindow
FindWindowW
MonitorFromPoint
GetMonitorInfoW
MonitorFromWindow
SetClipboardData
EmptyClipboard
CloseClipboard
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
DrawTextW
MapVirtualKeyW
SetForegroundWindow
ShowWindow
DestroyIcon
GetDesktopWindow
PostMessageW
LoadStringW
CopyRect
ScreenToClient
GetMessagePos
ReleaseDC
GetDC
OffsetRect
FillRect
GetSystemMetrics
UnregisterClassA
WindowFromDC
CreateIconFromResourceEx
GetIconInfo
GetCapture
DrawFrameControl
DrawFocusRect
GetSystemMenu
PostThreadMessageW
OffsetRgn
GetStockObject
CreateCompatibleDC
SelectObject
DeleteDC
CreateDIBSection
CreateCompatibleBitmap
BitBlt
GetObjectW
GetDeviceCaps
GetDIBits
EnumFontsW
CreateFontIndirectW
CreateSolidBrush
SetBkMode
SetTextColor
CreateRectRgnIndirect
SetBitmapBits
CreatePen
Rectangle
MoveToEx
LineTo
SetStretchBltMode
StretchBlt
GetBitmapBits
GetTextExtentPoint32W
FillRgn
CombineRgn
RestoreDC
IntersectClipRect
SaveDC
ExcludeClipRect
CreateRoundRectRgn
EqualRgn
CreateRectRgn
RectVisible
OffsetViewportOrgEx
GetObjectType
CreatePatternBrush
SetViewportOrgEx
GdiAlphaBlend
SetBrushOrgEx
GetRandomRgn
GetLayout
SetLayout
GetCurrentObject
LPtoDP
SelectClipRgn
DeleteObject
SHGetSpecialFolderPathA
ShellExecuteExW
SHChangeNotify
ExtractIconExW
DragQueryFileW
Shell_NotifyIconW
ord680
SHGetSpecialFolderPathW
SHBrowseForFolderW
SHGetPathFromIDListW
SHAppBarMessage
ShellExecuteW
SHGetFileInfoW
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetMalloc
SHGetFolderPathW
SHFileOperationW
UrlCombineA
SHStrDupW
PathCombineA
UrlUnescapeW
StrTrimW
SHEnumKeyExW
ord154
StrCmpW
SHGetValueA
StrChrIA
SHRegGetPathW
UrlCanonicalizeW
PathMatchSpecW
StrChrW
SHDeleteValueW
SHDeleteKeyW
StrToIntW
PathMatchSpecA
StrRStrIA
UrlIsOpaqueW
PathIsDirectoryW
SHSetValueW
StrRStrIW
UrlGetPartW
StrCmpIW
PathRemoveFileSpecW
StrCmpNIW
PathFindFileNameW
StrCmpNW
PathFindExtensionW
StrRetToBufW
PathFindFileNameA
UrlEscapeW
StrStrW
StrCatW
PathRenameExtensionW
PathAppendW
SHGetValueW
PathIsURLW
PathIsRootW
PathCombineW
PathFileExistsW
PathGetDriveNumberW
StrStrIW
StrStrIA
GetMenuPosFromID
GetModuleFileNameExW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
inet_addr
SetIEDocType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ