Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
1ea040d5834420c06821c753c1348720_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
1ea040d5834420c06821c753c1348720_NeikiAnalytics.exe
Size
1.4MB
MD5
1ea040d5834420c06821c753c1348720
SHA1
0ca667664a7ddbea448e61af0db412476c154ea2
SHA256
52be9ce3e2aa350b565e635a815e70ea37a96da309e6b0fddf4d29d64b254a6f
SHA512
e1701a9494a51ae3919a0eccef5a0da40533f672d581666a7055551f54820abec802e627e372ed28ecb1d049cdd225dea304740b444e99684d29ca4d9d5e1c26
SSDEEP
24576:wlSc42ftByL2QmQ9aQERpyWdHu3cLjay9Escv7/51WBc+qHRrEH76:wj42GIQd81HDLX9EsI7/5YBc+qH5
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
AppVISVSubsystems32.pdb
APIExportForDetours
CurrentThreadIsVirtualized
RequestUnhookedFunctionList
VirtualizeCurrentProcess
VirtualizeCurrentThread
_IsProcessHooked@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ