Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2a925275b6c789d39a960ac71c294572fb2a68f80accf118c141d2d6e0b565e6_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2a925275b6c789d39a960ac71c294572fb2a68f80accf118c141d2d6e0b565e6_NeikiAnalytics.dll
Resource
win10v2004-20240226-en
Target
2a925275b6c789d39a960ac71c294572fb2a68f80accf118c141d2d6e0b565e6_NeikiAnalytics.exe
Size
353KB
MD5
ddca52219f8a9e594a58e087c85c5770
SHA1
18b76495bf6e05d2d51234be2ad7b2676c526d89
SHA256
2a925275b6c789d39a960ac71c294572fb2a68f80accf118c141d2d6e0b565e6
SHA512
d4bfcf839033cc140bcbfca83d39d593ad0f95e292d4a63fa6b68330da4079abd50167d0fc23886612c552d2d94685af2cf61e4e7535aabd8fc25acb5a255ca3
SSDEEP
6144:mNcyPxUQMfMxiMSkJeOzcRJPCl+xNdlYaXBixqTBwW8XKIcwKAMk:m6QMkIa7zcRJPC03dlYyAxqTGXXyPk
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersionExW
GetModuleHandleW
OpenProcess
GetSystemWindowsDirectoryW
QueryDosDeviceW
GetLongPathNameW
OpenThread
GetSystemInfo
ReadProcessMemory
LocalAlloc
LocalFree
GetFileAttributesW
SearchPathW
lstrlenA
DebugBreak
OutputDebugStringW
InterlockedDecrement
GetLastError
GetFileAttributesExW
GetModuleFileNameW
GetPrivateProfileIntW
InterlockedIncrement
ReadFile
SetFilePointer
GetFileSize
SetLastError
WriteFile
DisableThreadLibraryCalls
InterlockedCompareExchange
WaitForSingleObject
WaitForMultipleObjects
ResumeThread
CreateThread
DeleteFileW
GetExitCodeThread
CopyFileW
GetTempPathW
MultiByteToWideChar
GetCurrentDirectoryW
GetTickCount
GetSystemDirectoryW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
DeviceIoControl
SetCurrentDirectoryW
Thread32Next
Thread32First
CreateFileW
Module32NextW
Module32FirstW
GetCurrentProcessId
MoveFileExW
LeaveCriticalSection
CreateSemaphoreW
ReleaseSemaphore
GetLocalTime
CreateEventW
SetEvent
GlobalUnlock
GlobalLock
GlobalSize
FileTimeToLocalFileTime
SystemTimeToFileTime
FlushFileBuffers
FindClose
FindNextFileW
FindFirstFileW
LockFileEx
UnlockFileEx
FileTimeToDosDateTime
GetSystemTime
GetFileType
MapViewOfFile
CreateFileMappingW
DuplicateHandle
GetCurrentProcess
UnmapViewOfFile
Sleep
ResetEvent
lstrcmpA
VirtualFree
FileTimeToSystemTime
VirtualAlloc
CreateMutexW
ReleaseMutex
FormatMessageW
GetCurrentThreadId
GetFileSizeEx
CloseHandle
GetFileInformationByHandle
lstrlenW
WideCharToMultiByte
TerminateProcess
EnterCriticalSection
SetFilePointerEx
GetACP
HeapFree
TlsFree
SetEnvironmentVariableW
TlsAlloc
HeapAlloc
GetProcessHeap
GetEnvironmentVariableW
TlsSetValue
TlsGetValue
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryW
GetProcAddress
SetFileAttributesW
FreeLibrary
GetWindow
wvsprintfW
CharNextW
LoadStringW
GetWindowThreadProcessId
GetAncestor
WindowFromPoint
GetWindowRect
GetShellWindow
GetSystemMetrics
FindWindowW
PostMessageW
CharUpperW
GetForegroundWindow
GetWindowInfo
GetDesktopWindow
SHGetFolderPathW
SHGetSpecialFolderPathW
CommandLineToArgvW
CreateStreamOnHGlobal
GetHGlobalFromStream
SysFreeString
VariantCopy
VariantClear
SysAllocStringLen
SysStringLen
SysAllocString
SysStringByteLen
SysAllocStringByteLen
ord16
ord21
ord23
ord32
ord15
_wmkdir
localtime
_wcsicmp
wcscmp
strlen
_wcsnicmp
fwrite
fclose
fread
fseek
_wfopen
__dllonexit
_onexit
?terminate@@YAXXZ
_initterm
_adjust_fdiv
wcsncpy
wcscpy
wcscat
strncpy
mktime
_CxxThrowException
qsort
_except_handler3
memcmp
_purecall
memmove
realloc
_vsnwprintf
_wtoi
iswdigit
malloc
free
wcslen
??2@YAPAXI@Z
time
__CxxFrameHandler
memset
memcpy
wcsrchr
wcsncmp
_errno
wcstok
_snwprintf
wcschr
swprintf
memchr
_wcslwr
swscanf
tolower
??1type_info@@UAE@XZ
_tzset
strerror
GetModuleFileNameExW
GetModuleInformation
EnumProcessModules
EnumProcesses
_stricmp
_wcsupr
NtQueryVirtualMemory
NtQueryInformationThread
NtQueryInformationProcess
RtlInitUnicodeString
NtCreateFile
Netbios
PathCombineW
StrCmpNW
PathRemoveBackslashW
StrCmpNIW
PathIsDirectoryW
PathFileExistsW
StrDupW
PathFindFileNameW
StrCmpIW
StrStrIW
PathAppendW
PathAddBackslashW
PathFindExtensionW
PathStripPathW
StrRChrW
StrCpyNW
PathStripToRootW
StrStrW
StrCmpW
PathUnquoteSpacesW
SHGetValueW
PathRemoveExtensionW
StrChrW
GetAdaptersInfo
HttpQueryInfoA
HttpOpenRequestA
InternetSetStatusCallbackA
HttpAddRequestHeadersA
InternetQueryOptionW
InternetCrackUrlW
InternetGetConnectedState
HttpSendRequestExA
HttpEndRequestA
InternetWriteFile
InternetErrorDlg
InternetOpenW
InternetCloseHandle
InternetSetOptionA
InternetOpenA
InternetConnectA
InternetReadFileExA
WinVerifyTrust
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
getpeername
WSAStartup
ntohl
inet_ntoa
WSACleanup
timeGetTime
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
CreateTrayClient
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ