Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
328eac9e70e2adccfcc6107a39457740_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
328eac9e70e2adccfcc6107a39457740_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Target
328eac9e70e2adccfcc6107a39457740_NeikiAnalytics.exe
Size
934KB
MD5
328eac9e70e2adccfcc6107a39457740
SHA1
a1af4860f2901be723118ead7015d2bb33c38ffa
SHA256
c667137373dbe7582e2650602815e77eaa30ea04a65d985f938d744f96a6068d
SHA512
dcee46facd0524b1c8d46fc8b92fb0129c09412f56a25f2cbd0cd88a2dd32389c29e2e25b709132144bf3aa8b0fd9ff3925eb9a2ad0c6987960acb10e730208e
SSDEEP
6144:QU84FZWNEtUtXo56bk0atwxhiKEWLT5Czf+Jtq9MBV+UdvrEFp7hK6xNT:QXEtUtXo5Ekza7z8SK9MBjvrEH7RNT
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
X:\output\1355487939\work\VS_Output\PGO\desktop_starter.pdb
GetModuleFileNameExA
EnumProcesses
EnumProcessModules
WinVerifyTrust
CryptMsgGetParam
CertFindCertificateInStore
CertGetNameStringW
CertFreeCertificateContext
CertCloseStore
CryptMsgClose
CryptQueryObject
GetProcAddress
FreeLibrary
CreateEventA
GetLastError
CloseHandle
GetCurrentThreadId
InterlockedCompareExchange
GetFileAttributesA
GetCurrentProcessId
GetModuleFileNameA
WaitForSingleObject
SuspendThread
LoadLibraryA
FormatMessageA
LocalFree
WriteFile
IsBadReadPtr
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
ReadProcessMemory
GetLocalTime
GetTempPathA
CreateDirectoryA
CreateFileA
DebugActiveProcess
SetEvent
WaitForDebugEvent
GetThreadContext
ContinueDebugEvent
InitializeCriticalSection
GetCurrentThread
VirtualProtect
DeleteCriticalSection
VirtualFree
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetModuleFileNameW
LoadLibraryW
GetSystemDirectoryW
GetCurrentProcess
WideCharToMultiByte
OpenProcess
MultiByteToWideChar
LocalAlloc
lstrcmpiA
GetCommandLineW
ExitProcess
DeleteFileW
RemoveDirectoryW
SetUnhandledExceptionFilter
FindFirstFileW
CreateFileW
ReadFile
FindNextFileW
FindClose
GetTempPathW
CreateEventW
WaitForMultipleObjects
GlobalAlloc
GlobalFree
CreateMutexW
OpenMutexW
Sleep
GetFileSize
LoadLibraryExW
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
VirtualAlloc
GetVersionExA
LoadIconA
SendMessageA
EndDialog
MessageBoxA
wsprintfA
EnumWindows
MessageBeep
SetForegroundWindow
SetActiveWindow
FlashWindow
GetWindowInfo
GetClassNameA
GetWindowThreadProcessId
FindWindowA
DialogBoxIndirectParamA
wvsprintfA
OpenProcessToken
DuplicateTokenEx
GetSidSubAuthorityCount
GetSidSubAuthority
IsValidSid
GetTokenInformation
ShellExecuteA
ShellExecuteW
ShellExecuteExW
ShellExecuteExA
SHGetPathFromIDListW
SHGetSpecialFolderLocation
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ