Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
530f9a4a512b10745db1ced15014a920_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
530f9a4a512b10745db1ced15014a920_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Target
530f9a4a512b10745db1ced15014a920_NeikiAnalytics.exe
Size
411KB
MD5
530f9a4a512b10745db1ced15014a920
SHA1
d6ffd1cf5196c213254b3892a26b5f0e4b601880
SHA256
6bb914c93df00b0c871d0199daf15aaca236715e79cb3067755e246e0e34d183
SHA512
cc0e7c13d736cbd8c5ca2a86eed7e2f72716d13d53cdbb964487e643d8270435888334cbfd7a3aeb688ed75186582732898b7e2576c2f0e79c24c9823cb88874
SSDEEP
6144:SAB2OOnDYfWU6+6WoeA6KFatrXAB2OOp6q:52nTUiWoB6KEtw2p
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateEventA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
InterlockedExchange
GetLocaleInfoA
OpenEventA
GetStringTypeW
GetStringTypeA
SetFilePointer
GetModuleHandleA
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
HeapSize
LCMapStringW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
ExitProcess
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TerminateThread
CreateThread
GetLastError
GetVersionExA
GetVersion
EnterCriticalSection
UnhandledExceptionFilter
DeleteCriticalSection
WaitForSingleObject
SetEvent
InitializeCriticalSection
GetCurrentProcessId
LeaveCriticalSection
DeleteFileA
Sleep
CloseHandle
LocalFree
LocalAlloc
TerminateProcess
GetCurrentThreadId
ExitThread
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
RaiseException
RtlUnwind
GetStartupInfoA
GetProcessHeap
GetCommandLineA
CreateFileA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
IsDebuggerPresent
GetCurrentProcess
GetProcAddress
MapViewOfFile
CreateFileMappingA
CreateMutexA
UnmapViewOfFile
ResetEvent
OpenMutexA
FindClose
FindFirstFileA
CreateDirectoryA
GetFileAttributesA
GetThreadLocale
FreeLibrary
LoadLibraryA
WriteFile
SetUnhandledExceptionFilter
DestroyWindow
SendMessageTimeoutA
LoadStringA
LoadAcceleratorsA
LoadImageA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadIconA
LoadCursorA
SetTimer
RegisterClassExA
PostQuitMessage
CreateWindowExA
RegisterWindowMessageA
PostMessageA
IsWindow
CreateDialogParamA
InvalidateRgn
SetWindowPos
SetWindowRgn
GetWindowLongA
GetWindowRect
GetMonitorInfoA
MonitorFromPoint
GetCursorPos
FindWindowA
GetDlgItem
SendMessageA
SetWindowLongA
DefWindowProcA
UpdateWindow
SendInput
ShowWindow
ExtCreateRegion
DeleteDC
GetDIBits
CreateICA
GetObjectA
CombineRgn
CreateRectRgn
DeleteObject
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorA
ExtractIconA
Shell_NotifyIconA
InternetCrackUrlA
InternetCanonicalizeUrlA
HttpOpenRequestA
InternetConnectA
InternetSetStatusCallback
InternetSetOptionA
InternetOpenA
InternetCloseHandle
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ