Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
7a93daee7d93bcc125043e1916a552b45418836cf40dd2cf4137c19458eada56_NeikiAnalytics.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7a93daee7d93bcc125043e1916a552b45418836cf40dd2cf4137c19458eada56_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
Target
7a93daee7d93bcc125043e1916a552b45418836cf40dd2cf4137c19458eada56_NeikiAnalytics.exe
Size
45KB
MD5
8fb3f8d2afd3dfd619e95ddd66181540
SHA1
e33ac6a7cf4566998191af6f4497dbba893ef160
SHA256
7a93daee7d93bcc125043e1916a552b45418836cf40dd2cf4137c19458eada56
SHA512
b625dd8625e90ba6adc9052c7be7a8e185588f02ba1c7d4936b343e3f8a28fc612f126c568ebeec091dea65b901065de0823718f06d0f1637e0d6610153fe434
SSDEEP
768:GXzjzHjKI9I0yqv1XfbprejXpubBpq503uc3at8GU9zcM:GnzDHxyQPl6jQnA03uc3aszL
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageOCSPSigning
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
cmroute.pdb
memset
memcpy
__C_specific_handler
_initterm
malloc
free
_amsg_exit
_XcptFilter
strchr
isspace
fclose
fseek
fwrite
_vsnprintf
fread
fopen
strtok
remove
strstr
sscanf
CmStrCpyAllocW
SzToWzWithAlloc
CmStrCpyAllocA
IsLogonAsSystem
CmFree
GetOSMajorVersion
CmMalloc
CmStrCatAllocA
GetOSVersion
GetLastError
GetProcAddress
VirtualAlloc
GlobalFree
GetTempFileNameA
LoadLibraryExA
ReadFile
GetFileInformationByHandle
GetTempPathA
DisableThreadLibraryCalls
lstrcmpiA
LoadLibraryA
CompareStringA
CreateFileA
lstrlenA
FreeLibrary
VirtualFree
CloseHandle
GetCurrentThreadId
Sleep
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetTickCount
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
CharLowerA
CharNextA
WSAStartup
WSACleanup
WSAAddressToStringA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
UuidToStringA
RpcStringFreeA
WinHttpGetProxyForUrl
WinHttpCrackUrl
WinHttpReadData
WinHttpOpen
WinHttpOpenRequest
WinHttpReceiveResponse
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSendRequest
WinHttpConnect
WinHttpCloseHandle
WinHttpGetDefaultProxyConfiguration
SetRoutes
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ