c:\dev\buildxl\buildroot\sdk\branch\UtilitiesSrc\PVRTexTool\TextureViewer\Build\WindowsPC\Win32\Release\PVRTextureViewer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aa3cf9ba63f593a0c954ddec0fd94066de40eec50a6f892f8c99c7aeb9fd9c08_NeikiAnalytics.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
aa3cf9ba63f593a0c954ddec0fd94066de40eec50a6f892f8c99c7aeb9fd9c08_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
aa3cf9ba63f593a0c954ddec0fd94066de40eec50a6f892f8c99c7aeb9fd9c08_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
cb7979f34818b12a60432b4503de8f40
-
SHA1
a029aca5a4d3bc4a9ce9228bb1ce4a1d579ec639
-
SHA256
aa3cf9ba63f593a0c954ddec0fd94066de40eec50a6f892f8c99c7aeb9fd9c08
-
SHA512
30edb5b054c675bede66ac0480b56a29fba1da2131ae1904e8dc8054a2bc7980a137fbdfc8c15a6f541233e5b25c2f43a906fecafb62c8b0826f6cd3c46daffa
-
SSDEEP
49152:qC+SfrpyhQwJgILfz+qakxYAZ6th/ORMm70gjQPmfHKlWNWR:5+UFyhQwCkHaqJZ6th/OzzjQPmfeeW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa3cf9ba63f593a0c954ddec0fd94066de40eec50a6f892f8c99c7aeb9fd9c08_NeikiAnalytics.exe
Files
-
aa3cf9ba63f593a0c954ddec0fd94066de40eec50a6f892f8c99c7aeb9fd9c08_NeikiAnalytics.exe.dll regsvr32 windows:6 windows x86 arch:x86
3255697f3d87fea709b39457a4a45f33
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ReleaseMutex
CreateProcessA
GetSystemInfo
WaitForMultipleObjects
GetCurrentThreadId
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
CloseHandle
lstrlenW
DisableThreadLibraryCalls
GetLastError
CreateThread
GetModuleFileNameW
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
gdi32
DeleteObject
CreateDIBSection
advapi32
RegCloseKey
RegOpenKeyExW
RegDeleteTreeW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
shell32
SHChangeNotify
ole32
StringFromGUID2
shlwapi
ord219
msvcr120
??3@YAXPAX@Z
??2@YAPAXI@Z
malloc
??_V@YAXPAX@Z
_vsnwprintf
free
__CxxFrameHandler3
_libm_sse2_sqrt_precise
memcpy
fclose
fopen
fprintf
fread
fseek
ftell
fwrite
remove
memset
__clean_type_info_names_internal
calloc
memmove
_libm_sse2_pow_precise
printf
rand
srand
getenv
sprintf
floor
abort
__iob_func
exit
vfprintf
fflush
vprintf
_purecall
strrchr
_copysign
qsort
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__CppXcptFilter
_amsg_exit
_malloc_crt
_initterm
_initterm_e
_except1
_crt_debugger_hook
__crtUnhandledException
__crtTerminateProcess
_except_handler4_common
_lock
_unlock
_calloc_crt
__dllonexit
_onexit
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 464KB - Virtual size: 463KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ