Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_93dcb683da5061c3e02f070362450dae_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-09_93dcb683da5061c3e02f070362450dae_mafia.exe
Resource
win10v2004-20240226-en
Target
2024-04-09_93dcb683da5061c3e02f070362450dae_mafia
Size
1.9MB
MD5
93dcb683da5061c3e02f070362450dae
SHA1
d31ab60dcdeae19925fe8f01661079037ca2230a
SHA256
c28a9ad32217f21e1fda9975b05a39fbd94cc1ad6069cc05776a040d033aa547
SHA512
b11a359765644f2085db07e903c48def66966500125f70ebf923c56576bad59b83c80fa56a0d349925ce4ae904f2d13d2e24e0842f167e0ee72dc74007ebee5f
SSDEEP
12288:GzbmLWi9HquxRXsP2EdCX+HBR+W4+5OwviydaReaMdA305T4MhMRY3VFvhrfKxFr:SEGPB35OwviydacRfhxVXKPt
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\b\build\slave\win\build\src\build\Release\chrome.exe.pdb
PathRemoveFileSpecW
PathFileExistsW
GetTempPathW
GetLastError
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
DuplicateHandle
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceW
VirtualFree
SetFilePointer
ReadFile
FreeLibrary
VirtualAlloc
CreateFileW
SystemTimeToFileTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
GetUserDefaultLangID
CreateMutexW
GetTickCount
WriteFile
SetLastError
ReleaseMutex
GetCurrentProcessId
CreateEventW
ExpandEnvironmentStringsW
InterlockedExchange
SetEnvironmentVariableW
lstrlenW
IsDebuggerPresent
GetNativeSystemInfo
GetVersionExW
SetInformationJobObject
SetHandleInformation
VirtualQueryEx
OpenProcess
AssignProcessToJobObject
GetStdHandle
GetProcessId
HeapSetInformation
ResumeThread
LocalAlloc
MapViewOfFile
GetFileAttributesW
Sleep
GetLongPathNameW
CreateFileMappingW
QueryDosDeviceW
GetLocaleInfoW
GetUserDefaultUILanguage
RaiseException
GetCurrentThreadId
CreateThread
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InterlockedExchangeAdd
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetEvent
ResetEvent
WaitForMultipleObjects
RtlCaptureStackBackTrace
GetSystemDirectoryW
GetWindowsDirectoryW
LoadLibraryA
FlushFileBuffers
RegisterWaitForSingleObject
UnregisterWaitEx
GetModuleHandleExW
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
InterlockedIncrement
ReleaseSemaphore
InterlockedDecrement
RtlCaptureContext
CreateSemaphoreW
InitializeCriticalSection
GetThreadContext
SuspendThread
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
TerminateJobObject
SignalObjectAndWait
GetProcessHandleCount
GetFileType
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
ReadProcessMemory
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
HeapReAlloc
GetFullPathNameW
HeapAlloc
GetProcessHeap
SetStdHandle
LCMapStringW
GetCPInfo
RtlUnwind
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetDriveTypeW
CompareStringW
CreateRemoteThread
GetSystemInfo
VirtualQuery
GetModuleHandleA
FormatMessageW
LocalFree
SetCurrentDirectoryW
LoadLibraryExW
GetModuleFileNameW
GetEnvironmentVariableW
GetEnvironmentVariableA
GetCommandLineW
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
GetCurrentDirectoryW
SetEndOfFile
GetUserObjectInformationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
wsprintfW
MessageBoxW
CloseWindowStation
CharUpperW
GetProfileType
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
timeGetTime
GetTraceEnableFlags
SetEntriesInAclW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegQueryInfoKeyW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
CreateProcessAsUserW
GetTraceLoggerHandle
TraceEvent
UnregisterTraceGuids
GetTraceEnableLevel
RegisterTraceGuidsW
RegDisablePredefinedCache
RevertToSelf
SetTokenInformation
GetLengthSid
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
SetThreadToken
ConvertStringSidToSidW
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine2
SetExperimentList3
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ