Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
3106c532325bce6535b064a5eae017d0_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3106c532325bce6535b064a5eae017d0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
Target
3106c532325bce6535b064a5eae017d0_NeikiAnalytics.exe
Size
960KB
MD5
3106c532325bce6535b064a5eae017d0
SHA1
2b94f67cb2c0a3e7d15edb8e8b8ba4779c10da84
SHA256
5adf56a61dea7542529952d58975149e65c2f39d5969251b9472031c43ec31ac
SHA512
f8aedb9d85008645cb2afe6951c269968af5fc612120d162cb0878827c91ed72b22b704f63f7a54e5c81be9965d55ee76d40c2ad2cd0dc0665bcf145338dc9c0
SSDEEP
24576:z2U6e+u18dRNNQh+jm17N/YKwiU+6IXkeQ0L:zP8pNWnhYFiPdXkeQ0L
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_DLL
C:\GitLab-Runner\builds\3zx_VjQw\0\dsm\core\src\XGKernel\XGKernel\RELEASE\XGKernel.pdb
GetWindowDC
GetWindowLongW
GetDesktopWindow
GetSystemMetrics
GetClassNameW
GetWindow
OpenClipboard
IsWindowVisible
ReleaseDC
PeekMessageW
MsgWaitForMultipleObjects
GetParent
GetWindowPlacement
ShowWindow
GetWindowRect
CloseClipboard
SetClipboardData
GetClipboardData
RegisterClipboardFormatW
GetClipboardFormatNameW
FillRect
GetClientRect
RedrawWindow
EndPaint
BeginPaint
KillTimer
SetFocus
SetWindowPos
MoveWindow
CallWindowProcW
PostQuitMessage
DefWindowProcW
SetWindowLongW
SetLayeredWindowAttributes
CreateWindowExW
RegisterClassExW
DispatchMessageW
TranslateMessage
GetMessageW
SetThreadDesktop
SetTimer
GetDC
MessageBoxW
FindWindowExW
SendMessageW
GetUserObjectInformationW
GetThreadDesktop
WindowFromPoint
GetCursorPos
GetWindowThreadProcessId
GetWindowTextW
GetForegroundWindow
GetFocus
GetActiveWindow
IsClipboardFormatAvailable
wsprintfW
DeleteObject
DeleteDC
CreateRectRgnIndirect
CreateCompatibleDC
CreateCompatibleBitmap
CombineRgn
RectInRegion
SelectObject
GetCurrentObject
GetDeviceCaps
GetMapMode
SetMapMode
SaveDC
SelectClipRgn
SetWorldTransform
SetViewportOrgEx
GetStockObject
CreatePen
LineTo
MoveToEx
RestoreDC
BitBlt
WSASetLastError
inet_ntoa
ntohs
CommandLineToArgvW
SHGetFolderPathW
DragQueryFileW
CreateBindCtx
CoGetMalloc
ReleaseStgMedium
DoDragDrop
StringFromIID
CoCreateGuid
CoTaskMemFree
ClosePrinter
GetPrinterW
PathFindExtensionW
PathRemoveFileSpecW
PathFindFileNameW
PathAppendW
PathIsDirectoryW
PathAppendA
StrCmpW
ConvertSidToStringSidW
IsWellKnownSid
GetTokenInformation
OpenProcessToken
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegFlushKey
RegCloseKey
FreeSid
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
VerQueryValueW
UuidToStringW
GetProcessImageFileNameW
InterlockedFlushSList
GetFileAttributesExW
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
GetFileType
WriteConsoleW
GetACP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
HeapReAlloc
RtlUnwind
FindClose
FindFirstFileExA
FindNextFileA
GetCPInfo
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
GetStringTypeW
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
SetStdHandle
FlushFileBuffers
OpenProcess
UnhandledExceptionFilter
GetProcAddress
GetLastError
LoadLibraryW
OutputDebugStringW
GetCurrentProcess
WaitForSingleObject
CreateEventW
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InterlockedCompareExchange
GetCurrentThreadId
ReleaseSemaphore
GetTickCount
lstrcmpW
lstrlenW
OpenMutexW
VirtualProtect
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GlobalAlloc
GlobalLock
GlobalUnlock
GetCurrentProcessId
IsBadReadPtr
WideCharToMultiByte
GetLongPathNameW
ExitProcess
SetEvent
Sleep
CloseHandle
GetLocalTime
GetSystemInfo
OpenEventW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetCommandLineW
CopyFileW
ProcessIdToSessionId
GetTempPathW
SetLastError
VirtualQuery
SetEndOfFile
GetProcessId
GetLogicalDriveStringsW
QueryDosDeviceW
MultiByteToWideChar
GetCurrentThread
LoadLibraryA
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
LocalFree
GetFileSize
ReadFile
CreateFileW
TerminateProcess
CreateProcessW
CreateDirectoryW
OpenThread
WriteFile
AddVectoredExceptionHandler
OutputDebugStringA
LocalAlloc
GetDriveTypeW
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualFree
VirtualProtectEx
VirtualQueryEx
FreeLibrary
LoadLibraryExA
LoadLibraryExW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetExitCodeProcess
CreateProcessA
VirtualAllocEx
ReadProcessMemory
WriteProcessMemory
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
ReleaseMutex
DuplicateHandle
SetThreadPriority
CreateThread
CreateSemaphoreW
lstrcpyA
lstrlenA
lstrcatA
WaitForMultipleObjects
CreateMutexW
CreatePipe
GetVersion
GetVersionExW
GetModuleFileNameA
HeapAlloc
GetProcessHeap
HeapFree
ExitThread
SetEncryptDir
SetObServer
SwmHelper
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ