Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_9158ee62adb7797d7a6605d9e7f08d04_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-15_9158ee62adb7797d7a6605d9e7f08d04_mafia.exe
Resource
win10v2004-20240412-en
Target
2024-04-15_9158ee62adb7797d7a6605d9e7f08d04_mafia
Size
1.2MB
MD5
9158ee62adb7797d7a6605d9e7f08d04
SHA1
dad0742b300d48ea770dee294baf9a58c58c9d27
SHA256
c78d6194ab3ebd9ae934798492a75d73ec076d9b0331afec19f81008bf41b4bb
SHA512
f9891f5960691f0d2a2ec0e13ccc83b625ac26b69e9daadb7ae50868a5c1e5f251ec78395c95571d78b72ffa2af840aad94f5d5e698c4c9542680a58a2f35831
SSDEEP
24576:jfKRh3XOprmBUDOTSIFlLrXtvDp9fuKCfTIX+bOgmHSR1b6K3T4cGLLLO275:jfUlX8aUDOTSIFRtv99sb6KEzC275
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\buildbot\209\chromeplus\src\build\static_library_Release\chrome.exe.pdb
PathRemoveFileSpecW
PathFindFileNameW
SetLastError
VirtualAlloc
SuspendThread
VirtualFree
GetThreadContext
SetThreadContext
FlushInstructionCache
ResumeThread
VirtualProtect
GetCurrentThreadId
SetCurrentDirectoryW
GetSystemInfo
VirtualQuery
GetTempPathW
GetEnvironmentVariableW
GetModuleFileNameW
CreateProcessW
CloseHandle
GetLastError
DuplicateHandle
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceW
SetFilePointer
ReadFile
FreeLibrary
CreateFileW
GetCurrentProcessId
GetTickCount
ReleaseMutex
CreateMutexW
WriteFile
OutputDebugStringA
SetEnvironmentVariableW
GetFileAttributesW
GetLongPathNameW
GetCurrentDirectoryW
MapViewOfFile
CreateFileMappingW
QueryDosDeviceW
GetUserDefaultLangID
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
SystemTimeToFileTime
TzSpecificLocalTimeToSystemTime
ExpandEnvironmentStringsW
CreateEventW
InterlockedExchange
lstrlenW
IsDebuggerPresent
GetNativeSystemInfo
GetVersionExW
OpenProcess
SetInformationJobObject
SetUnhandledExceptionFilter
VirtualQueryEx
HeapSetInformation
GetProcessId
GetStdHandle
SetHandleInformation
AssignProcessToJobObject
LocalAlloc
GetLocaleInfoW
GetUserDefaultUILanguage
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
CreateThread
MultiByteToWideChar
WideCharToMultiByte
GetSystemDirectoryW
GetWindowsDirectoryW
RtlCaptureStackBackTrace
InterlockedExchangeAdd
LoadLibraryA
TlsGetValue
TlsFree
TlsSetValue
ResetEvent
SetEvent
WaitForMultipleObjects
SetEndOfFile
FlushFileBuffers
UnregisterWaitEx
RegisterWaitForSingleObject
GetModuleHandleExW
GetQueuedCompletionStatus
CreateIoCompletionPort
PostQueuedCompletionStatus
InterlockedIncrement
ReleaseSemaphore
InterlockedDecrement
RtlCaptureContext
CreateSemaphoreW
InitializeCriticalSection
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
TerminateJobObject
SignalObjectAndWait
GetProcessHandleCount
GetFileType
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
ReadProcessMemory
GetStringTypeW
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
GetFullPathNameW
HeapReAlloc
HeapAlloc
GetProcessHeap
SetStdHandle
LCMapStringW
GetCPInfo
RtlUnwind
IsProcessorFeaturePresent
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapSize
GetTimeZoneInformation
WriteConsoleW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetDriveTypeW
CompareStringW
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
CreateRemoteThread
LoadLibraryExW
GetCurrentThread
GetModuleHandleA
FormatMessageW
LocalFree
GetEnvironmentVariableA
GetCommandLineW
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
TlsAlloc
GetUserObjectInformationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
wsprintfW
MessageBoxW
CloseWindowStation
CharUpperW
GetProfileType
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
timeGetTime
GetTraceEnableLevel
SetEntriesInAclW
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExW
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
RegSetValueExW
CreateProcessAsUserW
GetTraceEnableFlags
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
TraceEvent
RegDisablePredefinedCache
RevertToSelf
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetThreadToken
CreateRestrictedToken
DuplicateTokenEx
DuplicateToken
EqualSid
LookupPrivilegeValueW
CopySid
GetSecurityInfo
CreateWellKnownSid
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine2
SetExperimentList3
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ