Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_6d8908d2503ce28239c6a2d60d5a7733_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-17_6d8908d2503ce28239c6a2d60d5a7733_mafia.exe
Resource
win10v2004-20231222-en
Target
2024-02-17_6d8908d2503ce28239c6a2d60d5a7733_mafia
Size
274KB
MD5
6d8908d2503ce28239c6a2d60d5a7733
SHA1
7a6754db47f0e0294191025f07b049af5d762d03
SHA256
711140909a211a80ad52119e482e52299371cbc9bacd930cfcc214b95c949d33
SHA512
387cde8b78dac48f421228cf700f7ff31054e836629a5b75ecccd5dfc68e31c5c246307b443e6464eb764c039f584f455a8776529faca08ef2c88161ad50163c
SSDEEP
6144:s9a7vHv+/VRcKIuZuJ9l4rvYKT+hSa5/37U3:s9a7X+3XIuwJ9urvR+hSa/37w
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\昇泰安\龙宇\工作室\播放器\安装包脚本all\静默封装\20130712正常静默版本\trunk\Release\Unins.pdb
DeleteFileA
FindResourceA
FreeResource
LoadResource
SizeofResource
LockResource
GetVolumeInformationA
MultiByteToWideChar
GetLastError
GetPrivateProfileStringA
GetLocalTime
DeviceIoControl
GetVersionExA
FindFirstFileA
FindNextFileA
TerminateProcess
RemoveDirectoryA
FindClose
CreateFileW
WriteConsoleW
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetStringTypeW
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
GetFileType
SetHandleCount
IsProcessorFeaturePresent
LoadLibraryW
GetTempPathA
GetCurrentProcessId
GetTempFileNameA
CopyFileA
CreateProcessA
OpenProcess
WriteFile
CreateFileA
GetACP
WideCharToMultiByte
CloseHandle
Sleep
TerminateThread
WaitForSingleObject
WinExec
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
HeapCreate
IsValidCodePage
GetOEMCP
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
LCMapStringW
RtlUnwind
GetCPInfo
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineA
ExitProcess
GetModuleHandleW
GetProcAddress
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
HeapFree
CreateThread
GetCurrentThreadId
ExitThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DecodePointer
EncodePointer
InterlockedExchange
InterlockedDecrement
GetModuleFileNameA
InterlockedIncrement
SetWindowPos
GetDlgItem
CreateWindowExA
IsDlgButtonChecked
TranslateMessage
BeginPaint
SendMessageA
GetClientRect
LoadIconA
SendDlgItemMessageA
PostQuitMessage
CreateDialogParamA
GetMessageA
DestroyWindow
EndPaint
wvsprintfA
wsprintfA
PostMessageA
DispatchMessageA
LoadImageA
CheckRadioButton
GetSystemMetrics
ShowWindow
EnableWindow
GetDlgItemTextA
SetDlgItemTextA
CreateFontA
RegOpenKeyA
RegCloseKey
RegQueryValueExA
RegDeleteValueA
RegOpenKeyExA
RegDeleteKeyA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
Shell_NotifyIconA
CoTaskMemFree
CoInitialize
GdipDrawImageI
GdipDisposeImage
GdipCreateFont
GdipDrawString
GdipCreateSolidFill
GdipFillRectangleI
GdipDrawLineI
GdipCreatePen1
GdiplusStartup
GdipDeleteFontFamily
GdipDeleteGraphics
GdipDeleteFont
GdipDeletePen
GdipDeleteBrush
GdipCreateFontFamilyFromName
GdipCreateBitmapFromHICON
GdipCreateFromHDC
PathIsDirectoryA
PathCombineA
UrlGetPartA
PathIsURLA
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetConnectA
HttpQueryInfoA
InternetOpenUrlA
GetAdaptersInfo
Netbios
GetModuleFileNameExA
EnumProcessModules
EnumProcesses
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ