Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b72fa7f9720c0c2ffa63cd05a01fe0f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b72fa7f9720c0c2ffa63cd05a01fe0f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Target
b72fa7f9720c0c2ffa63cd05a01fe0f0_NeikiAnalytics.exe
Size
842KB
MD5
b72fa7f9720c0c2ffa63cd05a01fe0f0
SHA1
717443aaf6f40617d7609612e9a445086b380ed0
SHA256
88e77920bb08fbf5750f81f2da6614fcb642bbda0f1950e7b0f32f21fc16123f
SHA512
a0bfd5f2c64a8115bdca4eccf420efcb18f38762ad6e70bb9a559ebb3d0b04728fe1c0a0eb939ce89b68c7e237018fd46daca7f0f1003ca2a430a821787222cc
SSDEEP
12288:vpWllPEJL6gU6GRqwkhGPCW/c0FllCCOwvCygXRfCgiKvrrboHrER7o+m+YhuQpd:vpJ9Jw/cCOwvCygX5iECEpo3FuMKP/y
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\b\build\slave\win\build\src\build\Release\chrome.exe.pdb
PathRemoveFileSpecW
LoadLibraryA
GetTempPathW
GetLastError
GetTickCount
GetCurrentProcessId
GetModuleHandleW
VirtualProtect
VirtualAllocEx
VirtualFreeEx
InterlockedCompareExchange
Sleep
OutputDebugStringA
DuplicateHandle
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceW
VirtualFree
SetFilePointer
ReadFile
GetSystemInfo
FreeLibrary
VirtualAlloc
CreateFileW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetUserDefaultLangID
SystemTimeToFileTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
CreateMutexW
FormatMessageA
WriteFile
SetLastError
ReleaseMutex
lstrlenW
IsDebuggerPresent
CreateEventW
ExpandEnvironmentStringsW
LocalAlloc
GetCurrentThreadId
MapViewOfFile
CreateDirectoryW
GetFileAttributesW
GetCurrentDirectoryW
GetLongPathNameW
CreateFileMappingW
QueryDosDeviceW
GetProcessTimes
OpenProcess
GetProcessId
GetNativeSystemInfo
GetVersionExW
SetInformationJobObject
SetHandleInformation
AssignProcessToJobObject
GetStdHandle
SetUnhandledExceptionFilter
GetLocaleInfoW
GetUserDefaultUILanguage
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
RaiseException
CreateThread
HeapSetInformation
InterlockedExchange
SetEndOfFile
FlushFileBuffers
GetModuleHandleExW
RegisterWaitForSingleObject
UnregisterWaitEx
TlsGetValue
InterlockedIncrement
TlsSetValue
TlsAlloc
TlsFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
SetEvent
ResetEvent
WaitForMultipleObjects
ReleaseSemaphore
VirtualQueryEx
InterlockedDecrement
RtlCaptureContext
CreateSemaphoreW
InitializeCriticalSection
GetThreadContext
SuspendThread
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
WriteProcessMemory
VirtualProtectEx
TerminateJobObject
SignalObjectAndWait
GetProcessHandleCount
GetFileType
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
ReadProcessMemory
GetComputerNameExW
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
GetFullPathNameW
HeapAlloc
GetProcessHeap
HeapReAlloc
SetStdHandle
RtlUnwind
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetDriveTypeW
CompareStringW
GetCurrentProcess
TerminateProcess
CreateProcessW
CloseHandle
CreateRemoteThread
InterlockedExchangeAdd
GetModuleHandleA
FormatMessageW
LocalFree
SetCurrentDirectoryW
LoadLibraryExW
GetModuleFileNameW
GetEnvironmentVariableA
GetCommandLineW
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
ResumeThread
CreateProcessAsUserW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
RegEnumKeyExW
RegDeleteValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegDisablePredefinedCache
RevertToSelf
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetThreadToken
RegSetValueExA
CreateRestrictedToken
DuplicateTokenEx
GetUserNameW
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
EqualSid
DuplicateToken
MessageBoxW
wsprintfW
GetUserObjectInformationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
IsWindow
SendMessageTimeoutW
AllowSetForegroundWindow
GetWindowThreadProcessId
CharUpperW
CloseWindowStation
FindWindowExW
GetProfileType
WTSFreeMemory
WTSQuerySessionInformationW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
timeGetTime
ClearCrashKeyValueImpl
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SetClientId
SetCrashKeyValueImpl
SetExperimentList3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ