Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
8fe6d3b19d49fb074b5dc49b8d207e30_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8fe6d3b19d49fb074b5dc49b8d207e30_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Target
8fe6d3b19d49fb074b5dc49b8d207e30_NeikiAnalytics.exe
Size
2.3MB
MD5
8fe6d3b19d49fb074b5dc49b8d207e30
SHA1
8f44f904fe89465be4a831c651ca566d06b9283b
SHA256
2aca82b80232bb9ee51a3a3315e1268c0cefb13808893d5303ed9a103d70f381
SHA512
ec0b32f15f8961a2a6743c52b98e0f63720eb7232c596023c2f29c616c7a9a7cf7c6a2f9bab1f79542cb6e435a69616cbd4687e824cfb8298a68ed282aeb33dd
SSDEEP
49152:/wcM40vky++ia4lw4XyTtsBP/OlsLzFmNfW6FJKxxfZA4XFrU:/wcMpiacw4XzBP/OlsLzFmNfW6FJKxx0
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
d:\dbs\sh\odct\1105_210049_0\client\onedrive\Product\UX\Exe\obj\i386\OneDrive.pdb
IsDebuggerPresent
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
DeviceIoControl
ReleaseMutex
GetProcessTimes
GetExitCodeProcess
GetSystemTimes
LoadLibraryExW
CopyFileW
ReadDirectoryChangesW
RegisterApplicationRestart
GetFileInformationByHandleEx
OpenFileById
CreateSymbolicLinkW
CompareStringOrdinal
GetUserGeoID
VerSetConditionMask
VerifyVersionInfoW
SetLastError
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
WriteConsoleW
ReadConsoleW
SetEndOfFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
FindNextFileW
SetFilePointer
GetOEMCP
SetFileInformationByHandle
ReadFile
GetFinalPathNameByHandleW
GetFileType
GetFileSizeEx
GetFileSize
GetFileInformationByHandle
GetFileAttributesExW
GetFileAttributesW
GetDiskFreeSpaceExW
FindVolumeClose
FindNextVolumeW
FindFirstVolumeW
CreateFileW
ExpandEnvironmentStringsW
GetEnvironmentVariableW
GetCommandLineW
K32GetModuleFileNameExW
GetUserDefaultLCID
MoveFileW
GetModuleHandleW
IsWow64Process
GetSystemTimeAsFileTime
GetSystemTime
OpenProcess
TerminateProcess
GetCurrentProcess
Sleep
CreateMutexW
WaitForSingleObject
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
FindFirstFileW
FindClose
DeleteFileW
LCMapStringW
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
CreateProcessW
GetCurrentProcessId
FreeLibrary
InitializeCriticalSectionEx
GetProcAddress
LoadLibraryW
SetDllDirectoryW
GetModuleFileNameW
LocalFree
DeleteCriticalSection
DecodePointer
GetACP
IsValidCodePage
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
CompareStringW
GetTimeFormatW
GetDateFormatW
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InterlockedPushEntrySList
RtlUnwind
InitializeSListHead
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
ResetEvent
RaiseException
GetLastError
FindFirstFileExW
SetEvent
InitializeCriticalSectionAndSpinCount
GetLocaleInfoEx
GetCPInfo
CompareStringEx
LCMapStringEx
EncodePointer
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
ShowWindow
CreateWindowExW
PostMessageW
EnumWindows
GetClassNameW
GetWindowThreadProcessId
SendMessageTimeoutW
GetMessageW
TranslateMessage
RegisterClassW
DispatchMessageW
DestroyWindow
StartServiceCtrlDispatcherW
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
SetEntriesInAclW
StartServiceW
SetServiceStatus
RegisterServiceCtrlHandlerW
QueryServiceStatusEx
QueryServiceStatus
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfig2W
ChangeServiceConfigW
RegDeleteTreeW
RegUnLoadKeyW
RegLoadKeyW
RegEnumKeyW
RegDeleteKeyExW
RegCreateKeyTransactedW
SetFileSecurityW
GetAclInformation
FreeSid
DuplicateTokenEx
CreateWellKnownSid
AllocateAndInitializeSid
CreateProcessAsUserW
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
RegGetValueW
RegSetKeyValueW
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
LookupPrivilegeValueW
GetTokenInformation
OpenProcessToken
SHChangeNotify
SHParseDisplayName
ShellExecuteExW
SHCreateItemFromParsingName
SHGetSpecialFolderPathW
SHGetFolderPathW
SHGetFolderPathAndSubDirW
SHSetKnownFolderPath
ord526
SHGetKnownFolderPath
CommandLineToArgvW
SHFileOperationW
SHCreateDirectoryExW
CoInitialize
CoInitializeSecurity
CoInitializeEx
CoUninitialize
StringFromCLSID
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CreateBindCtx
CoCreateFreeThreadedMarshaler
CoSetProxyBlanket
CoCreateGuid
GetErrorInfo
SysStringLen
SysStringByteLen
LoadTypeLi
LoadRegTypeLi
GetRecordInfoFromTypeInfo
SysFreeString
SysAllocString
SetErrorInfo
SysAllocStringByteLen
CryptBinaryToStringW
CryptStringToBinaryW
RpcBindingFree
RpcBindingFromStringBindingW
RpcBindingVectorFree
RpcStringBindingComposeW
RpcStringFreeW
RpcServerInqBindings
RpcServerRegisterIfEx
RpcServerUnregisterIf
RpcServerInqCallAttributesW
RpcServerUseProtseqW
RpcBindingSetAuthInfoExW
RpcEpRegisterW
RpcEpUnregister
GetUserNameExW
SHCreateStreamOnFileW
SHRegGetBoolUSValueW
SHRegGetValueW
PathIsPrefixW
PathStripPathW
PathFileExistsW
SHGetValueW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
InternetCanonicalizeUrlW
InternetCheckConnectionW
WTSQuerySessionInformationW
WTSFreeMemory
WTSQueryUserToken
WTSEnumerateSessionsW
CreateEnvironmentBlock
GetDefaultUserProfileDirectoryW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE