Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-14_eca8d4d8a006314d8e550bfbad3f0560_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-14_eca8d4d8a006314d8e550bfbad3f0560_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-05-14_eca8d4d8a006314d8e550bfbad3f0560_mafia
Size
63.1MB
MD5
eca8d4d8a006314d8e550bfbad3f0560
SHA1
ef02ee3c67bcf4222058de970e861bf710f5e519
SHA256
7337c5fa76348dff799845e48a879b5989ab1f4557e2306c4a33a577fb658765
SHA512
aa36c81885096674d7a442170e80aa7a8d0d9f03645a7e747e364f2714e0773844cdc4c8a073aadaac3055250f18858489162429fc366e820f8a0e1d93613f8a
SSDEEP
1572864:KSfGaond8g7g64PVkFq/NboJNbbq+veWg+UGEh4c:KIFony3kYWbqNWg+UGq5
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\work\git\binaries\Installer\Release\ZonaInstallerFull.pdb
DrawThemeText
IsThemeActive
DrawThemeBackground
OpenThemeData
wnsprintfW
PathIsDirectoryW
StrToIntW
ord12
GdipLoadImageFromStream
GdipGetImageBounds
GdipCreatePen1
GdipDrawLineI
GdipCreateFromHDC
GdipAlloc
GdipDeletePen
GdipFree
GdiplusStartup
GdipCreateBitmapFromStream
GdipDeleteGraphics
GdipDisposeImage
GdipCloneImage
GdipDrawImageRectI
LoadResource
WaitForSingleObject
GetLastError
CloseHandle
GetTempFileNameW
FindFirstFileW
SetFilePointer
GetDriveTypeW
CreateProcessW
SystemTimeToFileTime
GetCurrentProcess
GetLogicalDriveStringsW
CreateDirectoryW
GlobalLock
GetModuleHandleW
WriteFile
GlobalAlloc
WideCharToMultiByte
Sleep
SizeofResource
GetVersionExW
GetExitCodeProcess
GetFileAttributesW
TerminateProcess
ReadFile
GetModuleFileNameW
CreateFileW
MultiByteToWideChar
GlobalUnlock
GetTempPathW
GetFileSizeEx
SetLastError
GetProcAddress
GlobalFree
FindClose
Process32FirstW
LocalAlloc
RemoveDirectoryW
CreatePipe
Process32NextW
GetModuleHandleA
FindNextFileW
CreateToolhelp32Snapshot
GetShortPathNameW
GetDiskFreeSpaceExW
LocalFree
GetSystemTime
SetFileAttributesW
ExpandEnvironmentStringsW
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetSystemDefaultLangID
EnumSystemLocalesA
FreeResource
GetFileSize
FormatMessageW
InterlockedDecrement
FindResourceW
TerminateThread
CreateThread
GlobalMemoryStatusEx
GetCurrentProcessId
VerSetConditionMask
VerifyVersionInfoW
GetWindowsDirectoryW
GetOEMCP
GetACP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapSize
QueryPerformanceCounter
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
GetStdHandle
HeapDestroy
HeapCreate
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CompareStringW
LCMapStringW
RtlUnwind
RaiseException
GetCPInfo
ExitProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
FindFirstFileExW
HeapAlloc
GetSystemTimeAsFileTime
CreateMutexW
GetLongPathNameW
DeleteFileW
DeleteCriticalSection
IsValidCodePage
LoadLibraryW
GetUserDefaultLCID
lstrlenA
IsValidLocale
SetStdHandle
WriteConsoleW
GetTimeZoneInformation
SetEnvironmentVariableW
SetEndOfFile
GetProcessHeap
SetEnvironmentVariableA
GetVolumeInformationW
GetExitCodeThread
LockResource
FindResourceExW
GetLocaleInfoA
GetUserDefaultLangID
HeapReAlloc
GetStartupInfoW
HeapSetInformation
GetCommandLineW
HeapFree
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedCompareExchange
InterlockedIncrement
SetWindowPos
SetWindowLongW
GetWindowLongW
LoadIconW
RegisterClassExW
LoadAcceleratorsW
CreateWindowExW
GetClientRect
LoadCursorW
PostQuitMessage
GetMessageW
GetDesktopWindow
GetSystemMetrics
MessageBoxW
SendMessageW
DrawTextW
DefWindowProcW
DispatchMessageW
TranslateMessage
ShowWindow
UpdateWindow
PostMessageW
GetWindowRect
GetClassInfoW
EndPaint
BeginPaint
CallWindowProcW
DrawStateW
DrawFrameControl
wsprintfW
DestroyWindow
InvalidateRect
GetWindowTextW
EnableWindow
SetWindowTextW
TranslateAcceleratorW
SetTextAlign
SetTextColor
SetBkMode
GetTextColor
GetTextExtentPoint32W
CreateFontW
DeleteDC
SelectObject
CreateCompatibleDC
TextOutW
OpenProcessToken
GetUserNameA
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegOpenKeyW
RegQueryValueExW
EqualSid
RegCreateKeyExW
GetTokenInformation
SHCreateDirectoryExW
SHGetMalloc
SHGetPathFromIDListW
SHChangeNotify
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
ord165
SHFileOperationW
CommandLineToArgvW
SHBrowseForFolderW
OleRun
CoSetProxyBlanket
CoInitializeSecurity
CreateStreamOnHGlobal
CLSIDFromProgID
CoCreateGuid
StringFromGUID2
CoCreateInstance
CoInitialize
CoUninitialize
GetErrorInfo
SysFreeString
VariantClear
SysAllocString
InternetQueryOptionW
InternetCloseHandle
InternetReadFile
HttpOpenRequestW
HttpQueryInfoW
HttpAddRequestHeadersW
InternetSetOptionW
HttpSendRequestW
InternetConnectW
InternetCrackUrlW
InternetOpenW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ