Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
44f41019e77f75c89576d5199a1270e736f6954129647921a24b14b04c04b049_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
44f41019e77f75c89576d5199a1270e736f6954129647921a24b14b04c04b049_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
Target
44f41019e77f75c89576d5199a1270e736f6954129647921a24b14b04c04b049_NeikiAnalytics.exe
Size
45KB
MD5
24d50adf134f2906359abc0fd50b73a0
SHA1
ceeffb288112d68b3b3ee3c5907d0f886c514adb
SHA256
44f41019e77f75c89576d5199a1270e736f6954129647921a24b14b04c04b049
SHA512
08ca0039699bb5217d1f82b43f8e88b31ee97e2281a05c056f2c8a5a1d2473378559cf9a2a1ec8ba60869b5c0b38e97fc3962b539a48444373a1d748157822dd
SSDEEP
768:r0ZDqu3ApAo7HvpGLPvsDg9bnsGnpDhfR7d6Yt0p1+9CgE2TfJbmR3h96:r0ZDquwpAbLH7hdfyj+9dlG3h96
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
?findUSBDevProp@Common@AndroidUnlock@@SAHPAXPB_WHAAV?$set@V?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@U?$less@V?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@@2@V?$allocator@V?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@@2@@std@@@Z
?startupExe@Common@AndroidUnlock@@SA?AW4RetCodeUnlock@2@ABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@0ABHP6G?AW432@PAXKPAU_PROCESS_INFORMATION@@2@Z2_N@Z
?Ansi2WChar@Common@AndroidUnlock@@SA?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@PBDH@Z
?dataPktPrase@Common@AndroidUnlock@@SA?AW4RetCodeUnlock@2@AAUDatasPacket@2@ABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@@Z
?dataHack@Common@AndroidUnlock@@SA?AW4RetCodeUnlock@2@AAV?$vector@V?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@V?$allocator@V?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@@2@@std@@ABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@5@11@Z
?getInstance@PathMgr@AndroidUnlock@@SAPAV12@XZ
?getPath@PathMgr@AndroidUnlock@@SAPAUPath@2@XZ
??0LogInfo@AndroidUnlock@@QAA@PB_WHH00ZZ
??1LogInfo@AndroidUnlock@@QAE@XZ
?getInstance@CLogServer@AndroidUnlock@@SAPAV12@XZ
?Trace@CLogServer@AndroidUnlock@@SAXABVLogInfo@2@@Z
?installMtkDriver@DriverMgr@AndroidUnlock@@SA?AW4RetCodeUnlock@2@XZ
?mtkDirverInstallMgr@DriverMgr@AndroidUnlock@@SA?AW4RetCodeUnlock@2@_N@Z
GetLastError
Sleep
GetTickCount
IsDebuggerPresent
InitializeSListHead
DisableThreadLibraryCalls
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
?_Xlength_error@std@@YAXPBD@Z
SetupDiGetClassDevsW
_CxxThrowException
__std_terminate
memset
memcpy
memmove
__std_exception_copy
__std_exception_destroy
__std_type_info_destroy_list
__CxxFrameHandler3
_except_handler4_common
_initialize_onexit_table
_configure_narrow_argv
_seh_filter_dll
_cexit
_initterm_e
_initterm
_execute_onexit_table
_initialize_narrow_environment
system
_invalid_parameter_noinfo_noreturn
malloc
free
_callnewh
??0MtkUnlock@AndroidUnlock@@QAE@$$QAV01@@Z
??0MtkUnlock@AndroidUnlock@@QAE@ABV01@@Z
??0MtkUnlock@AndroidUnlock@@QAE@XZ
??1MtkUnlock@AndroidUnlock@@QAE@XZ
??4MtkUnlock@AndroidUnlock@@QAEAAV01@$$QAV01@@Z
??4MtkUnlock@AndroidUnlock@@QAEAAV01@ABV01@@Z
?driverEnvSet@MtkUnlock@AndroidUnlock@@AAE?AW4RetCodeUnlock@2@XZ
?mtkGptInfo@MtkUnlock@AndroidUnlock@@QAE?AW4RetCodeUnlock@2@XZ
?mtkPartRemove@MtkUnlock@AndroidUnlock@@QAE?AW4RetCodeUnlock@2@ABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@@Z
?mtkReset@MtkUnlock@AndroidUnlock@@QAE?AW4RetCodeUnlock@2@XZ
?pipCbCall@MtkUnlock@AndroidUnlock@@CA?AW4RetCodeUnlock@2@PAXKPAU_PROCESS_INFORMATION@@0@Z
?setCBFunc@MtkUnlock@AndroidUnlock@@QAE?AW4RetCodeUnlock@2@P6GHHPAX@Z0@Z
?startFrpRemove@MtkUnlock@AndroidUnlock@@QAE?AW4RetCodeUnlock@2@_N@Z
?waitDev@MtkUnlock@AndroidUnlock@@AAE?AW4RetCodeUnlock@2@ABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@ABH@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ