Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_635a6a7c5b5a83c43d680ec81d4f1c56_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_635a6a7c5b5a83c43d680ec81d4f1c56_mafia.exe
Resource
win10v2004-20240412-en
Target
2024-04-16_635a6a7c5b5a83c43d680ec81d4f1c56_mafia
Size
995KB
MD5
635a6a7c5b5a83c43d680ec81d4f1c56
SHA1
f9de7066a601b69d2b7e8ce002142bd6651b6b53
SHA256
87758c759313dba45569bd14acc57176b39bf292964883fc3b5d86abf52f4fa9
SHA512
d3e8d9041e8b4621cc41627301b7b879fbd1d8e9a4d3a04935496210c9217607fecbae14fe81e3f472c978cc1a71b2ce52d59abd765b998ec9618e5e340f64c2
SSDEEP
12288:kUa/ifjCFXhvxBiHaucnHDuoB7QQHjUjUoUyc2lvFvUaITtBhEGDczX:kUaqcXVxBi6ztjUwoUyVlvFsaIT6G+X
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
F:\yuku\svn\XKGameBox2.0\Release\XKFlashGameBrowser.pdb
OutputDebugStringW
MulDiv
FreeResource
GetCurrentDirectoryW
ReadFile
GetACP
ExitProcess
DosDateTimeToFileTime
SetFilePointer
SystemTimeToFileTime
GetFileType
DuplicateHandle
SetEnvironmentVariableA
SetEndOfFile
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetStringTypeW
GetLocaleInfoW
SetLastError
TlsFree
TlsSetValue
GetExitCodeThread
TlsAlloc
IsValidCodePage
GetOEMCP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapCreate
IsProcessorFeaturePresent
SetHandleCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CompareStringW
GetCPInfo
LCMapStringW
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
GetStdHandle
WriteConsoleW
DecodePointer
EncodePointer
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
LoadLibraryW
lstrlenA
GetCurrentProcessId
GetCurrentThreadId
GetThreadPriority
GetSystemInfo
VirtualProtectEx
VirtualAlloc
FlushInstructionCache
SetThreadPriority
InitializeCriticalSection
VirtualFree
GetCurrentProcess
VirtualQuery
GetThreadContext
CreateDirectoryW
CreateProcessW
DeleteCriticalSection
lstrcmpiW
EnterCriticalSection
GetProcAddress
RaiseException
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
InterlockedIncrement
LoadLibraryExW
FreeLibrary
GetLastError
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameW
GetTickCount
CreateThread
ResumeThread
SuspendThread
LockResource
OpenThread
SizeofResource
InterlockedDecrement
LoadResource
FindResourceW
FindResourceExW
Sleep
GetCurrentThread
LocalFree
WriteFile
GetFileSize
CloseHandle
CreateFileW
GetVersionExW
TlsGetValue
GetClassInfoExW
SetPropW
TranslateMessage
IsWindow
RegisterClassW
GetPropW
CallWindowProcW
DispatchMessageW
HideCaret
ShowCaret
GetSysColor
LoadImageW
SetCaretPos
IsRectEmpty
GetFocus
GetWindowTextLengthW
GetMessageW
DestroyIcon
DrawIconEx
GetUpdateRect
SetRect
CharPrevW
DefWindowProcW
RegisterClassExW
LoadCursorW
PostQuitMessage
ReleaseDC
MoveWindow
GetDC
SetFocus
KillTimer
SetTimer
DrawTextW
LoadIconW
OffsetRect
InflateRect
wvsprintfW
CreateCaret
SendMessageW
ShowWindow
GetClientRect
SetWindowLongW
GetWindowLongW
IsIconic
GetWindowRect
GetKeyState
GetWindowTextW
EnableWindow
SetWindowTextW
PtInRect
ScreenToClient
SetWindowRgn
MessageBoxW
SetWindowPos
CharNextW
GetMonitorInfoW
IsWindowVisible
GetSystemMetrics
CreateWindowExW
SetLayeredWindowAttributes
MonitorFromWindow
GetParent
AnimateWindow
IsZoomed
PostMessageW
DestroyWindow
ClientToScreen
MapWindowPoints
GetDesktopWindow
IntersectRect
SetForegroundWindow
GetWindow
GetCursorPos
InvalidateRect
FillRect
SetCursor
ReleaseCapture
BeginPaint
CreateAcceleratorTableW
InvalidateRgn
SetCapture
EndPaint
CreateSolidBrush
DeleteObject
CreateRoundRectRgn
GetObjectW
PtInRegion
RestoreDC
CreatePen
SaveDC
Rectangle
GetTextMetricsW
SetWindowOrgEx
TextOutW
CreateCompatibleBitmap
RoundRect
GetClipBox
SetStretchBltMode
GetCharABCWidthsW
ExtTextOutW
CreateRectRgnIndirect
CreatePenIndirect
SelectClipRgn
SetBkColor
StretchBlt
CreateDIBSection
LineTo
MoveToEx
CreateCompatibleDC
SelectObject
DeleteDC
BitBlt
GetDeviceCaps
GetTextExtentPoint32W
GetStockObject
SetBkMode
SetTextColor
CreateFontIndirectW
GetPixel
CreateRectRgn
ExtSelectClipRgn
GetObjectA
CombineRgn
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegEnumKeyExW
RegOpenKeyExW
Shell_NotifyIconW
SHGetFolderPathW
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CoTaskMemAlloc
CoInitialize
OleUninitialize
OleInitialize
CoTaskMemRealloc
CoInitializeEx
CoTaskMemFree
PropVariantClear
CoUninitialize
CoCreateInstance
VariantInit
VariantClear
VarUI4FromStr
SysFreeString
SysAllocString
PathFileExistsW
timeGetDevCaps
timeBeginPeriod
timeKillEvent
timeEndPeriod
timeGetTime
timeSetEvent
ord17
_TrackMouseEvent
GdipDeleteFont
GdipSetTextRenderingHint
GdipSetStringFormatLineAlign
GdipCreateFontFromLogfontA
GdipCloneBrush
GdipDeleteBrush
GdiplusStartup
GdipSetStringFormatAlign
GdipDrawImageI
GdiplusShutdown
GdipImageGetFrameCount
GdipCloneImage
GdipImageGetFrameDimensionsCount
GdipCreateFromHDC
GdipGetPropertyItemSize
GdipDisposeImage
GdipAlloc
GdipGetPropertyItem
GdipImageSelectActiveFrame
GdipImageGetFrameDimensionsList
GdipLoadImageFromFile
GdipDeleteGraphics
GdipFree
GdipCreateFontFromDC
GdipDeleteStringFormat
GdipCreateStringFormat
GdipCreateLineBrushI
GdipDrawString
InternetReadFile
InternetCloseHandle
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
InternetOpenW
InternetCrackUrlW
InternetConnectW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ