Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
56140cf62524a9728ae6d527cbed6980_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
56140cf62524a9728ae6d527cbed6980_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Target
56140cf62524a9728ae6d527cbed6980_NeikiAnalytics.exe
Size
416KB
MD5
56140cf62524a9728ae6d527cbed6980
SHA1
8f1f27b2ed7caaedf443684bf94949af4ba2dcec
SHA256
9127266e5980ca14644c21aafb26feca810d1cf1e991665719ce48f5df854cec
SHA512
a863f8d433caef4e2f208aa31c624bb51aa68e5c6863db535317576391eca534238e6d51c3002e6d6c581c7535f15365185c7b33ccac36ef202fb5ccc8d0a2c8
SSDEEP
12288:j6FaqMeU/Hzb9r84jEIWOlDgSNj43Hk8X53U17vi:jCaqMr/f9r84jEHYDgOC5k17v
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\ReleaseAI\win\Release\custact\x86\viewer.pdb
ord224
CertFreeCertificateContext
CertGetNameStringW
FindResourceExW
CreateFileW
CloseHandle
FindClose
DeleteFileW
FindNextFileW
GetFileAttributesW
CreateDirectoryW
WriteFile
SetFilePointer
GetModuleHandleW
GetWindowsDirectoryW
GetTempPathW
GetTempFileNameW
MoveFileW
GetCurrentProcess
GetSystemDirectoryW
LoadLibraryExW
CreateToolhelp32Snapshot
HeapFree
OpenProcess
Process32NextW
GetProcessTimes
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
LoadResource
ReadProcessMemory
Sleep
SetLastError
ExitProcess
lstrcmpiW
GetModuleFileNameW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringW
GetCurrentThreadId
FlushFileBuffers
GetStringTypeW
InitializeCriticalSectionEx
DecodePointer
GetCommandLineW
GetStartupInfoW
WriteConsoleW
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapReAlloc
HeapSize
HeapDestroy
IsProcessorFeaturePresent
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
GetProcAddress
LoadLibraryW
LocalAlloc
GetLastError
LocalFree
FindResourceW
SizeofResource
LockResource
GetProcessHeap
TerminateProcess
HeapAlloc
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
Process32FirstW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SleepConditionVariableSRW
WakeAllConditionVariable
GetFileType
GetStdHandle
GetModuleHandleExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
RaiseException
FormatMessageA
GetLocaleInfoEx
EncodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
RtlUnwind
GetWindowLongW
AllowSetForegroundWindow
GetForegroundWindow
GetWindowThreadProcessId
EnumWindows
SetWindowPos
SetSecurityDescriptorDacl
RegQueryValueExW
RegOpenKeyExW
ConvertSidToStringSidW
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
LookupAccountSidW
InitializeSecurityDescriptor
SetEntriesInAclW
GetSecurityDescriptorDacl
ShellExecuteExW
ShellExecuteW
CoCreateInstance
CoAllowSetForegroundWindow
CoUninitialize
CoInitialize
VariantInit
SysAllocString
SysFreeString
VariantClear
PathIsUNCW
PathFileExistsW
ord176
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ