Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3299a29a7eff98ce4b3c23aaee7e3438f3db068cf22bc6db110d07d26503df3a_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3299a29a7eff98ce4b3c23aaee7e3438f3db068cf22bc6db110d07d26503df3a_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Target
3299a29a7eff98ce4b3c23aaee7e3438f3db068cf22bc6db110d07d26503df3a_NeikiAnalytics.exe
Size
1.0MB
MD5
dfbcfdfb44d9f81e32287dddf628ddc0
SHA1
2c6d169bc78f79ad9ec1017ac6284311321dddfa
SHA256
3299a29a7eff98ce4b3c23aaee7e3438f3db068cf22bc6db110d07d26503df3a
SHA512
35b196f2c60cf9f37d545fe9f36a23177fa1f1f99b4ee1b1a71bc3523b13a0dcd1ee85c99bc32bfce2bc4fb397cb1c597839cb591af7fa529ae4d5ce7f90b608
SSDEEP
24576:S6JoReh51zUXshsU9fq0rZe+QK0ltXe9/6s63mpmXaLGxcUAS+TFnk4zQ:SRu1AFUo0rI6Gu91LpmXAGKjS0N7M
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\building\ludashi_projects\360HardwareMaster\inst\Release\inst.pdb
WriteFile
CreateFileW
GetTempPathW
DebugBreak
OutputDebugStringW
lstrlenA
GetModuleFileNameW
Sleep
RaiseException
GetCurrentThreadId
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
InitializeCriticalSection
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
lstrcmpiW
LockResource
GetTempFileNameW
DeviceIoControl
GetCurrentProcessId
LoadLibraryW
CreateProcessW
GetProcAddress
WideCharToMultiByte
LocalFree
UnmapViewOfFile
SetFilePointer
MapViewOfFile
CreateFileMappingW
GetFileAttributesExW
CreateMutexW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
GetLongPathNameW
GetLocalTime
GetFileSizeEx
GetCPInfo
GetCurrentThread
HeapReAlloc
GetStartupInfoW
GetLastError
CloseHandle
GetDriveTypeW
GetDiskFreeSpaceExW
lstrcmpiA
lstrcmpA
SetEnvironmentVariableA
GetLogicalDriveStringsW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetTimeZoneInformation
SetStdHandle
GetLocaleInfoW
LCMapStringA
GetTickCount
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleHandleA
FlushFileBuffers
GetConsoleMode
lstrcpyW
GetFullPathNameW
SetLastError
lstrlenW
InterlockedIncrement
InterlockedDecrement
MoveFileExW
RemoveDirectoryW
GetFileAttributesW
CreateThread
ExitThread
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
GetConsoleCP
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
TlsFree
DeleteAtom
FindAtomW
TlsAlloc
ReleaseMutex
AddAtomW
OpenThread
GetAtomNameW
TlsSetValue
WaitForSingleObject
TlsGetValue
GetSystemTime
FormatMessageW
ReadFile
SetFilePointerEx
SetFileAttributesW
FindFirstFileW
LCMapStringW
GetStartupInfoA
GetFileType
SetEndOfFile
LocalFileTimeToFileTime
SetHandleCount
InitializeCriticalSectionAndSpinCount
InterlockedExchange
FindNextFileW
DeleteFileW
SetConsoleCtrlHandler
GetModuleFileNameA
GetStdHandle
HeapSize
GetSystemTimeAsFileTime
SystemTimeToFileTime
FindClose
CompareStringW
FatalAppExitA
HeapDestroy
HeapCreate
IsValidCodePage
GetOEMCP
CreateFileA
VirtualAlloc
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
GetACP
LoadStringW
CharNextW
wvsprintfW
DefWindowProcW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
UnregisterClassA
DestroyWindow
SetWindowLongW
CreateWindowExW
GetClassInfoExW
LoadCursorW
RegisterClassExW
LoadImageW
GetSystemMetrics
PostQuitMessage
PostMessageW
SetWindowTextW
SendMessageW
GetWindowLongW
CallWindowProcW
FindWindowExW
GetWindowThreadProcessId
wsprintfW
GetActiveWindow
MessageBoxW
RegQueryInfoKeyW
RegEnumKeyExA
RegQueryValueExW
RegQueryValueExA
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExA
SHGetSpecialFolderPathW
ord165
ShellExecuteW
SHCreateDirectoryExW
SHFileOperationW
ShellExecuteExW
CommandLineToArgvW
CoTaskMemRealloc
CoCreateGuid
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromProgID
CoCreateInstance
CoInitialize
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoUninitialize
VarUI4FromStr
VariantClear
VariantInit
SysAllocString
SysFreeString
PathFindFileNameW
PathIsPrefixW
PathAppendW
PathFileExistsW
PathFindExtensionW
PathCombineW
wnsprintfW
SHGetValueW
PathRemoveBackslashW
StrToIntExW
SHGetValueA
PathRemoveFileSpecW
SHSetValueA
InitCommonControlsEx
WSACleanup
WSAStartup
SetupIterateCabinetW
WTHelperProvDataFromStateData
WinVerifyTrust
CertGetNameStringW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
GetModuleFileNameExW
GetAdaptersInfo
InternetGetConnectedState
URLDownloadToCacheFileW
URLDownloadToFileW
Netbios
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ