Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
013112b7b426d2560b0007df32bd7d70_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
013112b7b426d2560b0007df32bd7d70_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Target
013112b7b426d2560b0007df32bd7d70_NeikiAnalytics.exe
Size
78KB
MD5
013112b7b426d2560b0007df32bd7d70
SHA1
f1694d54c71d715fd612575c19d61ea5e640b60d
SHA256
75e2e0fec39f65e0cbdf6ff8db2050a573d0d54f60eccab0466c91e10f3b5d5b
SHA512
762291e4c1e2f3b4cdf17d0175babf225397151e2d7d5677c6d3eced97ac068bcedb84aa22931a1d5eaa347da311e1950e7a004aa85ef17d10124d735b1b9444
SSDEEP
1536:nLNIW39SaZTbFARlq7jC1OZstZu0TS3gEdUJCkb0FGc:nLlbZTZX3BAtTS3gEdUJCkb0FGc
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\Data\My Projects\Troy Source Code\tcp1st\rifle\Release\rifle.pdb
StrToIntA
StrChrA
StrStrA
connect
WSAStartup
gethostname
WSAIoctl
htons
setsockopt
WSACleanup
recv
socket
closesocket
gethostbyname
send
WSAGetLastError
DeleteUrlCacheEntry
RegCloseKey
GetUserNameA
RegOpenKeyExA
RegCreateKeyA
RegQueryValueExA
RegSetValueExA
URLOpenBlockingStreamA
ShellExecuteA
wsprintfA
GetAdaptersInfo
IsProcessorFeaturePresent
GetStringTypeW
LoadLibraryW
HeapSize
RtlUnwind
SetStdHandle
WriteConsoleW
CreateFileW
FlushFileBuffers
CompareStringW
SetEnvironmentVariableA
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapReAlloc
ExitProcess
GetComputerNameA
CreateFileA
GetFileSize
lstrcmpA
lstrlenA
HeapAlloc
HeapFree
WaitForSingleObject
GetTickCount
GetProcessHeap
WriteFile
GetCommandLineA
GlobalAlloc
Sleep
GetExitCodeProcess
CreateProcessA
TerminateProcess
ReadFile
lstrcatA
CreateDirectoryA
SetCurrentDirectoryA
GetLastError
OpenMutexA
CreatePipe
GetModuleFileNameA
CreateMutexA
GetVersionExA
WinExec
CloseHandle
GetTempPathA
lstrcpyA
GetSystemTimeAsFileTime
HeapSetInformation
GetStartupInfoW
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
EncodePointer
HeapCreate
GetProcAddress
GetModuleHandleW
GetStdHandle
GetModuleFileNameW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetTimeZoneInformation
RaiseException
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ