Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
629a6d5b1218bb3a01413b0ce15e887b5964c5b1656056f6b87e468c3b681036_NeikiAnalytics.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
629a6d5b1218bb3a01413b0ce15e887b5964c5b1656056f6b87e468c3b681036_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
Target
629a6d5b1218bb3a01413b0ce15e887b5964c5b1656056f6b87e468c3b681036_NeikiAnalytics.exe
Size
160KB
MD5
599ebcf6f701038273edf29946e4c910
SHA1
df80be6cc6b29cd3b10082e7619eb2d0484b347f
SHA256
629a6d5b1218bb3a01413b0ce15e887b5964c5b1656056f6b87e468c3b681036
SHA512
c44c86110424d3736399daf439c5680f9b67e4b228efaffaf0c8481fa34b9a5a7cf77e10670c5de501224767c1748398a23506bd8db111fcf522994008756724
SSDEEP
3072:gMAlhDScGgKqqrccIPaldpZOWCFheHzS7whb1cVeojlesjv:8fDiWqO9o9KemeK
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
E:\nsmsrc\nsm\1410\1410\client32\release\pcihooks.pdb
SetLastError
GetCurrentProcess
CloseHandle
SetEvent
UnmapViewOfFile
WaitForMultipleObjects
Sleep
WaitForSingleObject
OpenEventA
OpenProcess
MapViewOfFile
GetLastError
OpenFileMappingA
ResetEvent
CreateThread
GetCurrentThreadId
CreateEventA
GetTickCount
LocalFree
CreateFileMappingA
LocalAlloc
ExitProcess
IsBadWritePtr
CreateProcessA
SetHandleInformation
GetProcessTimes
GetNativeSystemInfo
DisableThreadLibraryCalls
HeapSize
LoadLibraryW
FreeLibrary
SetConsoleCtrlHandler
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
GetStringTypeW
FatalAppExitA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
RaiseException
HeapDestroy
HeapCreate
GetModuleFileNameW
GetStdHandle
WriteFile
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
IsProcessorFeaturePresent
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapReAlloc
GetCurrentThread
GetVersionExA
DeleteCriticalSection
InitializeCriticalSection
GetCurrentProcessId
EnterCriticalSection
GetModuleHandleA
LoadLibraryA
LeaveCriticalSection
IsBadReadPtr
VirtualProtect
GetModuleFileNameA
VirtualQuery
InterlockedExchange
GetProcAddress
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
IsValidCodePage
GetOEMCP
RtlUnwind
HeapAlloc
DecodePointer
GetCommandLineA
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetClassNameA
FindWindowA
GetWindowLongA
SetWindowLongA
GetRawInputData
GetParent
DefWindowProcA
GetKeyNameTextA
GetKeyboardState
GetKeyboardLayout
ActivateKeyboardLayout
MapVirtualKeyExA
ToUnicodeEx
GetKeyState
CreateWindowExA
RegisterRawInputDevices
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
SetWindowsHookExW
UnhookWindowsHookEx
FindWindowExA
GetWindowThreadProcessId
CharLowerA
GetGUIThreadInfo
CallNextHookEx
MessageBoxA
wsprintfA
PostThreadMessageA
SendMessageA
PostMessageA
IsWindow
RegisterClassA
ReportEventA
DeregisterEventSource
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegisterEventSourceA
SysFreeString
VariantClear
VariantInit
ImageDirectoryEntryToData
GetModuleFileNameExA
HookKeyboard
HookKeyboard2
Monitor
ProtectMe
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ