Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_2926682f771bdcc434675f1ba9db1f12_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-28_2926682f771bdcc434675f1ba9db1f12_mafia.exe
Resource
win10v2004-20240426-en
Target
2024-04-28_2926682f771bdcc434675f1ba9db1f12_mafia
Size
1.2MB
MD5
2926682f771bdcc434675f1ba9db1f12
SHA1
fe48d4aedf51f6bb23eec3ebe95c7532ad009c3a
SHA256
dfc801a31ad38377e41a69488112ccf17dc5c2f7fae0abd598616456de813a8d
SHA512
818835e444a43dabcd8d835dce7600d69bfd404701362252cff1e07919238297aecf275aaf524543b854ae757714a2795db668649ee57512cd0c78b3246df992
SSDEEP
24576:EwadFfjzKywiBvnfW5gyttUkq90IRESB5jUIZTSuyj3Xe97WAJ:Ewof/Kyw2fW5gy/Ukq/L5jjTSDUiE
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
G:\RuanMei\PCMaster\bin\Release\pcmastertray.pdb
GetFullPathNameW
GetTempFileNameW
WaitNamedPipeW
DeleteFileA
MoveFileA
CreateProcessW
GetCommandLineW
GetCurrentProcessId
GetLocalTime
SetUnhandledExceptionFilter
CopyFileW
FindNextVolumeA
QueryDosDeviceA
FindFirstVolumeA
OpenEventW
SetEvent
FindNextFileW
FindClose
GetFileSize
FindFirstFileW
SetProcessWorkingSetSize
TerminateProcess
OpenProcess
HeapFree
HeapAlloc
GetProcessHeap
SetLastError
GetStartupInfoW
MulDiv
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetExitCodeThread
CreateThread
ExpandEnvironmentStringsW
CreateEventW
lstrlenA
WritePrivateProfileStringW
GetSystemDirectoryW
WinExec
lstrcpyA
GetComputerNameW
IsBadCodePtr
GetPrivateProfileStringW
OpenMutexW
GetSystemPowerStatus
GetProcessTimes
CancelIo
GetOverlappedResult
lstrcmpiA
FileTimeToDosDateTime
GetVolumePathNamesForVolumeNameA
SetFileAttributesW
DeleteFileW
GetTickCount
MoveFileW
MoveFileExW
lstrcmpW
CreateFileA
GetFileSizeEx
ReadFile
CreateMutexW
Process32FirstW
Process32NextW
GetWindowsDirectoryW
SizeofResource
SuspendThread
lstrcmpiW
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
Sleep
LoadLibraryW
VirtualProtect
WriteProcessMemory
GetFileTime
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
GetVersionExW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetModuleHandleW
GetProcAddress
DeviceIoControl
lstrcpynW
lstrcpyW
lstrcmpA
LocalAlloc
LocalFree
CreateFileW
WriteFile
CloseHandle
GetCurrentProcess
FlushInstructionCache
InitializeCriticalSectionAndSpinCount
RaiseException
GetModuleFileNameW
GetTempPathW
GetCurrentDirectoryW
CreateDirectoryW
GetFileAttributesW
FreeResource
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
lstrlenW
EnterCriticalSection
LeaveCriticalSection
InterlockedExchange
LoadLibraryExW
LoadLibraryExA
FreeLibrary
BeginUpdateResourceW
BeginUpdateResourceA
EndUpdateResourceW
UpdateResourceW
GetLastError
GetSystemTime
SystemTimeToFileTime
GetLongPathNameW
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
GetFullPathNameA
GetDriveTypeW
SetCurrentDirectoryW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
WriteConsoleW
WaitForSingleObject
SetConsoleCtrlHandler
FlushFileBuffers
SetStdHandle
FatalAppExitA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetStringTypeW
ExitProcess
HeapCreate
IsBadReadPtr
DeleteCriticalSection
InitializeCriticalSection
WideCharToMultiByte
MultiByteToWideChar
FindResourceExW
FindResourceW
LoadLibraryA
HeapDestroy
HeapReAlloc
HeapSize
InterlockedCompareExchange
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
LoadResource
LockResource
GetSystemInfo
InterlockedPushEntrySList
IsProcessorFeaturePresent
VirtualFree
SetFilePointer
GetFileType
SetHandleCount
GetLocaleInfoW
GetStdHandle
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
UnhandledExceptionFilter
HeapSetInformation
ResumeThread
ExitThread
GetSystemTimeAsFileTime
VirtualQuery
EncodePointer
DecodePointer
RtlUnwind
InterlockedPopEntrySList
VirtualAlloc
GetStockObject
CreateSolidBrush
GetDeviceCaps
CreateCompatibleBitmap
CreateRoundRectRgn
CombineRgn
GetClipBox
CreateRectRgnIndirect
ExtSelectClipRgn
CreateDIBSection
GetObjectW
SetDIBColorTable
StretchBlt
CreateFontIndirectW
BitBlt
GetBitmapBits
SetTextColor
SetBkMode
SetStretchBltMode
DeleteObject
GetDIBColorTable
SelectObject
DeleteDC
CreateCompatibleDC
SelectClipRgn
BuildExplicitAccessWithNameW
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
SetEntriesInAclW
CreateWellKnownSid
InitializeSecurityDescriptor
AdjustTokenPrivileges
LookupPrivilegeValueW
FreeSid
InitiateSystemShutdownW
RegEnumValueW
DuplicateTokenEx
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
CreateProcessAsUserW
QueryServiceStatus
ControlService
OpenSCManagerW
OpenServiceW
CloseServiceHandle
QueryServiceConfigW
ChangeServiceConfigW
StartServiceW
GetNamedSecurityInfoW
SetSecurityDescriptorDacl
DeleteAce
GetTokenInformation
GetUserNameW
RegFlushKey
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
AllocateAndInitializeSid
SetNamedSecurityInfoW
OpenProcessToken
ShellExecuteW
CommandLineToArgvW
ShellExecuteExW
SHGetMalloc
SHGetFolderPathW
Shell_NotifyIconW
CoTaskMemFree
CreateStreamOnHGlobal
StringFromCLSID
OleUninitialize
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoInitialize
CoUninitialize
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoInitializeSecurity
LoadRegTypeLi
OleCreateFontIndirect
VariantInit
SysStringLen
VariantClear
LoadTypeLi
SysAllocString
SysAllocStringLen
SysFreeString
CreateErrorInfo
GetErrorInfo
VariantChangeType
SetErrorInfo
DispCallFunc
VarUI4FromStr
StrStrIA
PathFileExistsW
PathAppendW
PathFindExtensionW
PathFileExistsA
PathFindFileNameW
InitCommonControlsEx
_TrackMouseEvent
AlphaBlend
TransparentBlt
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
GetModuleFileNameExW
EnumProcessModules
IsPwrHibernateAllowed
GetPwrCapabilities
SetSuspendState
HttpOpenRequestW
InternetConnectW
GetUrlCacheEntryInfoW
InternetCheckConnectionW
HttpSendRequestExW
InternetSetCookieW
HttpSendRequestW
InternetGetCookieExW
InternetGetCookieW
HttpQueryInfoW
InternetCloseHandle
InternetWriteFile
HttpEndRequestW
InternetOpenW
InternetSetOptionW
InternetOpenUrlW
InternetReadFile
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipCreateHICONFromBitmap
GdipSaveImageToStream
GdipLoadImageFromFileICM
GdipLoadImageFromFile
GdipGetImagePixelFormat
GdipSetInterpolationMode
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipCreateBitmapFromFile
GdipBitmapUnlockBits
GdipCreateHBITMAPFromBitmap
GdipLoadImageFromStreamICM
GdipGetImagePalette
GdipGetImagePaletteSize
GdipFree
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipCloneBrush
GdipCreateFontFromLogfontW
GdipCreateFontFromDC
GdipDrawString
GdipSetTextRenderingHint
GdipSetStringFormatTrimming
GdipCreateSolidFill
GdipDeleteFont
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDeleteBrush
GdipDrawImagePointRectI
GdipLoadImageFromStream
GdipDrawImageRectRectI
GdipSetImageAttributesWrapMode
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipCloneImage
GdipReleaseDC
GdipCreateFromHDC
GdipDrawImageRectI
GdipGetImageHeight
GdipDrawImageI
GdipGetImageGraphicsContext
GdiplusShutdown
GdiplusStartup
GdipSetSmoothingMode
MprConfigServerConnect
MprConfigGetFriendlyName
GetPerAdapterInfo
GetInterfaceInfo
GetNetworkParams
GetAdaptersInfo
WinHttpConnect
WinHttpOpenRequest
WinHttpSetTimeouts
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpOpen
PdhOpenQueryW
PdhAddCounterW
PdhCloseQuery
PdhGetFormattedCounterValue
PdhRemoveCounter
PdhCollectQueryData
CryptQueryObject
CryptMsgGetParam
CryptDecodeObject
CertFindCertificateInStore
CertGetNameStringW
WinVerifyTrust
URLDownloadToFileW
MiniDumpWriteDump
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ