Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_1124e2178c608b6d4c5158e33b6cd7d7_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_1124e2178c608b6d4c5158e33b6cd7d7_mafia.exe
Resource
win10v2004-20240226-en
Target
2024-03-19_1124e2178c608b6d4c5158e33b6cd7d7_mafia
Size
156KB
MD5
1124e2178c608b6d4c5158e33b6cd7d7
SHA1
a59f22031a8abf8efaf57452cb58a58f61097c51
SHA256
04edb1009e9d2c5036592c85a3dee4998271bf4cb873d1f50079bebf6ebd1c07
SHA512
ecde30a4e6faf93b34ed76a0e0acbf90da5fafb088ef356eca4dcd6b8b54dda45197fb02cd367691447420fb4ba180f99600767dafaf2b9ce9a0769ce6dac9ff
SSDEEP
3072:eNes6f80spt35d3mroORW1PH39sNJhWhhvMmx3S1j:eNebf80uja7RWt9sDwhhvMIs
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\5003593\Documents\Visual Studio 2012\Projects\EMReset\Release\EMReset.pdb
OpenProcess
CreateFileW
GetLastError
SetStdHandle
LoadLibraryW
GetCurrentProcess
LocalFree
FormatMessageW
CreateProcessW
CloseHandle
VerifyVersionInfoW
VerSetConditionMask
WriteConsoleW
Sleep
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RtlUnwind
HeapAlloc
RaiseException
GetCPInfo
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetShellWindow
PostMessageW
FindWindowW
GetWindowThreadProcessId
DuplicateTokenEx
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CreateProcessWithTokenW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE