Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a44a09326eca802d4eca21a8f0c211c3a2a322ed946849c631e1a4c8cf3fd785_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a44a09326eca802d4eca21a8f0c211c3a2a322ed946849c631e1a4c8cf3fd785_NeikiAnalytics.dll
Resource
win10v2004-20240226-en
Target
a44a09326eca802d4eca21a8f0c211c3a2a322ed946849c631e1a4c8cf3fd785_NeikiAnalytics.exe
Size
1.8MB
MD5
5341150cdca02c152a931dfe2c1ebb70
SHA1
2b506bc4f69d54082062b7d42ee5346c64cbb2a6
SHA256
a44a09326eca802d4eca21a8f0c211c3a2a322ed946849c631e1a4c8cf3fd785
SHA512
63e711529f65da85dc3b943cf848c896d01a7ab4781ce221bdc1e8775c55bc207e4eedbf4619db0ef5beddf2bb3e43c675d350d7531060c63e3387a541fa5cc6
SSDEEP
24576:HKWZe0mYFaFgq9W4+Kp72+rN7Ie9B0tSL+PIEpHtuh8PblQ4cHtTCu/dTRCkTHWV:IvT1BSkO5dQApFodUkT2EifqkGI
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\jenkins\workspace\pc-2345mpcsafe-build\RhinoProtect\Publish\OutPut\bin\Win32\Release\pdb\ProtectApi.pdb
NetApiBufferFree
NetLocalGroupGetMembers
GetEnvironmentVariableW
GetLogicalDriveStringsW
GetPrivateProfileStringW
CreateMutexW
InterlockedDecrement
GetCurrentProcessId
InterlockedIncrement
InitializeCriticalSectionAndSpinCount
GetFileAttributesW
SetFileAttributesW
MultiByteToWideChar
RaiseException
DecodePointer
DeleteCriticalSection
LocalAlloc
LocalFree
WaitForSingleObject
EnterCriticalSection
WriteFile
QueryDosDeviceW
LeaveCriticalSection
InitializeCriticalSection
PeekNamedPipe
CreateFileW
GetExitCodeThread
Sleep
SetEvent
ResetEvent
GetOverlappedResult
IsBadReadPtr
WaitNamedPipeW
OpenMutexW
IsBadStringPtrW
GetProcessHeap
HeapAlloc
HeapFree
VirtualQuery
GetExitCodeProcess
CloseHandle
GetLastError
CreateEventW
FreeLibrary
GetProcAddress
LoadLibraryW
GetModuleFileNameW
WaitForMultipleObjects
OpenProcess
ReadFile
GlobalMemoryStatusEx
InterlockedExchange
TryEnterCriticalSection
GetCurrentThreadId
DuplicateHandle
WaitForSingleObjectEx
GetCurrentProcess
SwitchToThread
GetCurrentThread
QueryPerformanceCounter
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
FormatMessageW
WideCharToMultiByte
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
CreateProcessW
GetVersionExW
GlobalAlloc
GlobalFree
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
ExpandEnvironmentStringsW
LoadLibraryExW
SetFileTime
SetFilePointer
SetEndOfFile
GetFileSize
GetFileTime
GetACP
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
ResumeThread
FindNextFileW
FindClose
FileTimeToSystemTime
CreateDirectoryW
GetFullPathNameW
lstrlenW
GetTempPathW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
MoveFileExW
CopyFileW
GetTempFileNameW
MoveFileW
ReleaseMutex
GetFileSizeEx
InterlockedExchangeAdd
DeviceIoControl
GetLocalTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
OutputDebugStringW
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
EncodePointer
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
GetStdHandle
GetFileType
RtlUnwind
ExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
HeapReAlloc
GetStringTypeW
HeapSize
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
WriteConsoleW
wsprintfW
GetWindowLongW
IsWindowVisible
SendMessageW
ShowWindow
IsWindow
SetForegroundWindow
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegCreateKeyExW
GetUserNameW
ShellExecuteExW
SHChangeNotify
SHGetFolderPathW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderPathW
CoCreateInstance
CoInitialize
CoUninitialize
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
CryptMsgClose
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
CertCloseStore
CryptMsgGetParam
CertFindCertificateInStore
CreateObject
DestroyObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ