Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-08_0fd0490a7f416d75aae6eda45c3068d4_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-08_0fd0490a7f416d75aae6eda45c3068d4_mafia.exe
Resource
win10v2004-20240226-en
Target
2024-04-08_0fd0490a7f416d75aae6eda45c3068d4_mafia
Size
864KB
MD5
0fd0490a7f416d75aae6eda45c3068d4
SHA1
ceacb3bc910fcbfff57ff28efeba0350f1aed524
SHA256
8480acbebcd1ec723881cd31597b03d888fe38a3caf395bb6b9bd561d644ac91
SHA512
ba233bbbf1c53810064c94f98107bf870d7decaa8e8392aec6007771fc4d3a5c1a3b8146cfa263db31485b2344e9853a8af4c9d02a396075d88c317adddf269c
SSDEEP
12288:R9nRl170lXcdAwrWqNg8PXo5IUMgweKzH9EwAN6pXwd1c0b2n5BR39rqOZbUVwwu:R9nZ/5XaCwsp39rqqCEz5pWb9D7t8QhK
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\yfe\chrome27\src\build\Release\yfe.exe.pdb
PathRemoveFileSpecW
PathAppendW
PathFileExistsW
SetCurrentDirectoryW
LoadLibraryExW
GetSystemInfo
VirtualQuery
GetTempPathW
GetEnvironmentVariableW
GetModuleFileNameW
CreateProcessW
CloseHandle
LocalAlloc
FreeLibrary
InterlockedExchange
LoadLibraryA
RaiseException
DuplicateHandle
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceW
VirtualFree
SetFilePointer
ReadFile
VirtualAlloc
CreateFileW
GetCurrentProcessId
GetTickCount
ReleaseMutex
SetLastError
CreateMutexW
WriteFile
OutputDebugStringA
FormatMessageA
GetUserDefaultLangID
CreateEventW
ExpandEnvironmentStringsW
SetEnvironmentVariableW
lstrlenW
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
GetNativeSystemInfo
GetVersionExW
GetCurrentThreadId
OpenProcess
SetInformationJobObject
VirtualQueryEx
HeapSetInformation
GetProcessId
ResumeThread
AssignProcessToJobObject
GetStdHandle
SetHandleInformation
GetFileAttributesW
GetLastError
GetLongPathNameW
GetCurrentDirectoryW
QueryDosDeviceW
MapViewOfFile
CreateFileMappingW
GetLocaleInfoW
GetUserDefaultUILanguage
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
CreateThread
RtlCaptureStackBackTrace
InterlockedExchangeAdd
TlsGetValue
TlsFree
TlsSetValue
TlsAlloc
ResetEvent
SetEvent
WaitForMultipleObjects
SetUnhandledExceptionFilter
GetWindowsDirectoryW
UnregisterWaitEx
RegisterWaitForSingleObject
SetEndOfFile
FlushFileBuffers
GetModuleHandleExW
GetQueuedCompletionStatus
CreateIoCompletionPort
PostQueuedCompletionStatus
InterlockedIncrement
ReleaseSemaphore
InterlockedDecrement
RtlCaptureContext
CreateSemaphoreW
InitializeCriticalSection
GetThreadContext
SuspendThread
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
TerminateJobObject
SignalObjectAndWait
GetProcessHandleCount
GetFileType
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
ReadProcessMemory
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
HeapReAlloc
GetFullPathNameW
HeapAlloc
GetProcessHeap
SetStdHandle
LCMapStringW
GetCPInfo
RtlUnwind
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapSize
GetTimeZoneInformation
WriteConsoleW
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetDriveTypeW
CompareStringW
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
CreateRemoteThread
GetModuleHandleA
FormatMessageW
LocalFree
GetEnvironmentVariableA
GetCommandLineW
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
GetSystemDirectoryW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
CloseWindowStation
wsprintfW
MessageBoxW
GetUserObjectInformationW
CharUpperW
GetProfileType
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
timeGetTime
GetLengthSid
SetTokenInformation
RevertToSelf
RegDisablePredefinedCache
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExW
CreateProcessAsUserW
GetTraceEnableLevel
GetTraceEnableFlags
ConvertStringSidToSidW
GetTraceLoggerHandle
UnregisterTraceGuids
TraceEvent
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
SetThreadToken
RegisterTraceGuidsW
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine2
SetExperimentList3
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ