Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
4d83291f6a1b7835e50da8c01bd44f60_NeikiAnalytics.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4d83291f6a1b7835e50da8c01bd44f60_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
4d83291f6a1b7835e50da8c01bd44f60_NeikiAnalytics.exe
Size
514KB
MD5
4d83291f6a1b7835e50da8c01bd44f60
SHA1
b8ad9700b600cb51bca99df769b27a97e036a99d
SHA256
7f6e24ca44a79e39ae277b7031423aae9db72a1b931cff15a1ab7b4da1c165be
SHA512
2d65204ddc02f56ebe735b10a13c1f7de4f85fdbdc96bd5af5242a9bfc65473504f2c7109ee5be4aef5ce8514deabf2fb0a114e14764e5675d1c44f78924ec72
SSDEEP
12288:6CjiJqxguKzQfn/JAFQwwRWsx8fZ6yHGHD9b:6A2uKzS0S8fZ6629b
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\build\misc_group\Misc\Release\Misc.pdb
FindResourceExW
GetTempPathW
GetWindowsDirectoryW
DeleteFileW
FindFirstFileW
FindNextFileW
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
CreateMutexW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
lstrcpynW
FindResourceW
FindClose
SizeofResource
LoadResource
GetModuleFileNameW
WaitForMultipleObjects
WaitForSingleObject
ResetEvent
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
CreateEventW
InitializeCriticalSection
GetLastError
GetProcessHeap
HeapSize
HeapFree
CloseHandle
lstrcatW
IsDebuggerPresent
OutputDebugStringW
GetStringTypeW
EncodePointer
SetLastError
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
GetCurrentProcessId
GetCurrentThreadId
GetFileSizeEx
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
HeapReAlloc
GetFileSize
WriteFile
SetEndOfFile
SetFilePointer
GetFileTime
GetSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetTempFileNameW
LoadLibraryExW
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
DeviceIoControl
lstrcmpA
lstrcmpiA
GetSystemDirectoryW
CreateFileA
InterlockedCompareExchange
Sleep
FreeResource
GetSystemWindowsDirectoryW
GetVersionExW
ReadFile
FlushFileBuffers
InterlockedFlushSList
RtlUnwind
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SetFilePointerEx
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetStdHandle
GetModuleFileNameA
WriteConsoleW
ExitProcess
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
ReadConsoleW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
HeapAlloc
HeapDestroy
GetProcAddress
CreateFileW
LockResource
wsprintfW
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
OpenProcessToken
RegEnumKeyExA
GetTokenInformation
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegEnumKeyExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CoInitialize
CoCreateGuid
PathAppendW
StrCmpNIW
PathFileExistsW
PathFindFileNameW
StrTrimA
StrStrIA
PathRemoveFileSpecW
SHSetValueA
PathIsDirectoryW
SHGetValueA
wnsprintfW
PathCombineW
StrStrIW
StrCmpIW
CertGetNameStringW
WTHelperProvDataFromStateData
WinVerifyTrust
VerQueryValueW
GetAdaptersInfo
CreateTrayClient
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ