Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
049264b4bf5eb0b7ea8fe9c113be6d90_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
049264b4bf5eb0b7ea8fe9c113be6d90_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Target
049264b4bf5eb0b7ea8fe9c113be6d90_NeikiAnalytics.exe
Size
1.9MB
MD5
049264b4bf5eb0b7ea8fe9c113be6d90
SHA1
3092d399a86b5403bb556995daac83b8115a38b8
SHA256
6cb8b68ee6a31233c2bba4bac31cfb382caa4ab65fc83b70a2b84a89e48a62a2
SHA512
43f44a8ebe43ad987955445a6556280a3ff27ed921e5e9e19513a7decc39c52ea163c273dea9bd0c026f360749097b018198d90e99adaa83c6b18273d8f27dd6
SSDEEP
24576:TvpH41Cl36RgrO/+xnwIYLiVLXuZV6T/i9Nm8OzcwxdfAyDKTAuybQVaTwcC:Lmk0868Tqrm/Bxd8T6QVXN
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\TXPCGJ\QQPCMgr_proj\13.0.46265.301_for_gf2.0_dev\Source\Setup\PackageTools\product\win32\dbginfo\kpacket.pdb
SizeofResource
LockResource
LoadResource
GetTempPathW
CreateFileW
FindResourceExW
GetCurrentProcess
GetFileSize
GetModuleHandleW
ExpandEnvironmentStringsW
TerminateProcess
GetWindowsDirectoryW
FindFirstFileW
lstrcmpW
GetCurrentDirectoryW
SetFileAttributesW
DeleteFileW
MoveFileExW
GetFileAttributesW
GetTickCount
CreateDirectoryW
GetLastError
FindNextFileW
SetFilePointer
FindClose
ReadFile
RemoveDirectoryW
WriteFile
CreateProcessW
GetModuleFileNameW
WaitForSingleObject
GetSystemDirectoryW
MultiByteToWideChar
GetCommandLineW
WideCharToMultiByte
UnmapViewOfFile
SetEndOfFile
CreateFileMappingW
MapViewOfFile
EnterCriticalSection
GetCurrentProcessId
WaitForMultipleObjects
VirtualFree
VirtualAlloc
DeleteCriticalSection
SetEvent
InitializeCriticalSection
ReleaseSemaphore
ResetEvent
CreateSemaphoreW
CreateEventW
GetStdHandle
GetFileInformationByHandle
CopyFileW
SetFileTime
MoveFileW
GetTempFileNameW
GetSystemInfo
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToSystemTime
GetLocalTime
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
CreateFileA
CloseHandle
FindResourceW
GetProcAddress
LoadLibraryW
LeaveCriticalSection
FlushFileBuffers
SetStdHandle
LoadLibraryA
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
HeapCreate
GetStringTypeW
RaiseException
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
InterlockedIncrement
InterlockedDecrement
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCurrentThreadId
CreateThread
GetStartupInfoW
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
ExitProcess
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
UnregisterClassA
CharLowerW
CharUpperW
GetDesktopWindow
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
CoUninitialize
CoInitialize
SysFreeString
SysAllocString
VariantClear
VariantCopy
PathAddBackslashW
PathRemoveFileSpecW
PathIsDirectoryW
PathAppendW
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ