Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
0698a491efaf59fd0e3ae03865e04b90_NeikiAnalytics.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0698a491efaf59fd0e3ae03865e04b90_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
0698a491efaf59fd0e3ae03865e04b90_NeikiAnalytics.exe
Size
512KB
MD5
0698a491efaf59fd0e3ae03865e04b90
SHA1
67749468946f44f369c402f984bec172b5ef7d20
SHA256
c59c1387967935c57605edc79e677ab517c6ca5121b2deb33d02333f58a7a30b
SHA512
1868cbf059335d428d23d0f29d8fd8d07779a0d7eeff39e8f00bd4dc8e18ba0520fc9e2377c7cbcbb3f7d08745f2f0a09e7a8eee2c75f33f10083c55812fa7e7
SSDEEP
12288:nhrj71bqkZG41AMhKu6j2NUvOrdw/+sZ8LfppEx1:hrHskZG41AMhKu5Jqz
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\Jenkins\workspace\TOOLBAR_PACKAGE\DEFENSE_SRC\IDC\Release\IdcSrv.pdb
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
MultiByteToWideChar
WideCharToMultiByte
Sleep
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
DeleteCriticalSection
CreateFileW
GetFileSize
ReadFile
SetFilePointer
GetTempPathW
GetProcAddress
GetModuleHandleW
SetEvent
ReleaseMutex
LoadLibraryA
LocalAlloc
FreeLibrary
GetModuleFileNameW
LoadLibraryW
GetCurrentProcessId
OpenProcess
EnterCriticalSection
LeaveCriticalSection
IsBadReadPtr
VirtualQuery
VirtualProtect
GetTimeZoneInformation
DeleteFileA
GetSystemTime
GetTempPathA
DeleteFileW
GetVersionExA
WaitForSingleObject
CreateMutexW
CreateEventW
UnmapViewOfFile
OpenFileMappingW
MapViewOfFileEx
CreateFileMappingW
CloseHandle
LocalFree
GetLastError
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
LockFileEx
GetFileAttributesW
GetFileAttributesA
FindAtomW
HeapDestroy
InitializeCriticalSection
FormatMessageA
LockFile
UnlockFile
IsDebuggerPresent
OutputDebugStringW
EncodePointer
RtlUnwind
IsProcessorFeaturePresent
GetCommandLineA
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetStdHandle
WriteFile
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetStringTypeW
GetFileType
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryExW
CompareStringW
LCMapStringW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
FlushFileBuffers
WriteConsoleW
SetEndOfFile
GetFullPathNameW
GetFullPathNameA
CreateFileA
InterlockedIncrement
SetEnvironmentVariableA
FindWindowW
IsWindow
PostMessageW
GetWindowThreadProcessId
RegOpenKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegDeleteValueW
RegOpenKeyW
RegSetValueExW
RegQueryValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
SetNamedSecurityInfoW
SetSecurityInfo
InitializeSecurityDescriptor
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
StrStrIW
StrCmpIW
GetAdaptersInfo
GetProcessImageFileNameW
ImageDirectoryEntryToData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ