Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
4f9ed5510c1eecc84c6054d3f2a75350_NeikiAnalytics.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4f9ed5510c1eecc84c6054d3f2a75350_NeikiAnalytics.dll
Resource
win10v2004-20240226-en
Target
4f9ed5510c1eecc84c6054d3f2a75350_NeikiAnalytics.exe
Size
119KB
MD5
4f9ed5510c1eecc84c6054d3f2a75350
SHA1
6d792f4d0ddf74ad880f5351107e7661a0144f27
SHA256
0b30b3b99ce61198ca239b42df83808e03f757e9960d8810cbc9bbbe5b37506d
SHA512
528ebbc77d6dfeefde250e71574d546599ea51e9a42d114c874e47791419ffd24ff4014a9dc549de73295baf4bc2a9b6148692c99794a56f1980c53b44d074c3
SSDEEP
3072:puduZOkSekCuf8pfi7MepO1fWPh7zQj0o:UuZc5Cu0p6YepofWPhO
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
d:\ms_inbox\amity2\hcwcpxx\xx\objfre_win7_amd64\amd64\hcwCPxx.pdb
GetVersion
DisableThreadLibraryCalls
lstrlenA
lstrlenW
GetModuleFileNameA
GetCurrentProcess
VirtualAlloc
GetCurrentThreadId
GetModuleHandleW
FlsSetValue
GetCommandLineA
HeapFree
HeapAlloc
RaiseException
ExitProcess
EncodePointer
DecodePointer
FlsFree
SetLastError
FlsGetValue
FlsAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoW
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapSetInformation
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetSystemTimeAsFileTime
RtlUnwindEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
OutputDebugStringA
WriteFile
HeapReAlloc
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlPcToFileHeader
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
Sleep
SetFilePointer
LoadLibraryExW
WriteConsoleW
SetStdHandle
GetStringTypeW
LCMapStringW
CreateFileW
VirtualProtect
SetThreadStackGuarantee
VirtualQuery
MultiByteToWideChar
CreateThread
GetCurrentProcessId
GetWindowsDirectoryW
CloseHandle
DeleteCriticalSection
WaitForMultipleObjects
CreateEventW
ResetEvent
EnterCriticalSection
GetLastError
LeaveCriticalSection
TerminateThread
InitializeCriticalSection
GetTickCount
WaitForSingleObjectEx
SetEvent
WaitForSingleObject
CreateProcessW
LocalFree
GetSystemInfo
GetProcAddress
GetVersionExW
GetSystemPowerStatus
LoadLibraryW
FreeLibrary
TerminateProcess
RegOpenKeyExW
RegEnumKeyExW
RegSetValueW
RegCreateKeyW
GetSecurityDescriptorDacl
GetLengthSid
IsValidSecurityDescriptor
FreeSid
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeAcl
SetKernelObjectSecurity
GetSecurityDescriptorLength
GetAce
SetSecurityDescriptorDacl
AddAccessDeniedAce
InitializeSecurityDescriptor
GetKernelObjectSecurity
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
RegSetValueExW
RegDeleteKeyW
GetSystemMetrics
CoCreateInstance
CoUninitialize
StringFromGUID2
CoInitialize
CoFreeUnusedLibraries
GetRunningObjectTable
CreateItemMoniker
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ