Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-02_abd36a134da866cc7c632b5d938d4237_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-02_abd36a134da866cc7c632b5d938d4237_mafia.exe
Resource
win10v2004-20240426-en
Target
2024-06-02_abd36a134da866cc7c632b5d938d4237_mafia
Size
628KB
MD5
abd36a134da866cc7c632b5d938d4237
SHA1
09d31e6a4526568d3b05a5a079381079dc181114
SHA256
4ba7dc928256da9c1a61d1569b4316985a9db79ee1d41fff8d1cacc99554f068
SHA512
f3ef2910cc681fdc9cea8f28eab99ed12db6dc34a279fd307d78d12e82482b47566c05c9bb2458d567a18323d6b40ab471b8453798ec5f9b33bca6016fcc7ad1
SSDEEP
12288:ocbBQguMfjZdTFgCZCvzen7/KrWztc5wF:oSBQguMfjZdhgCZCW7/KOP
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\cleintci\workspace\safebrowser_bdtray_master\bdtray\BDBrowserOutput\Release\bdtray.pdb
?RegService@Com@Util@@YGJABU_GUID@@0PA_W1@Z
GetLogController
?GetService@Com@Util@@YGJABU_GUID@@PAPAX@Z
?ClearService@Com@Util@@YGJXZ
?LoadStringFromXml@String@Help@@YAJPA_W0@Z
?CreateObjectByIID@Com@Util@@YGJABU_GUID@@PAPAX@Z
?RegObject@Com@Util@@YGJABU_GUID@@0PA_W1@Z
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
CreateMutexW
CloseHandle
LockResource
FindResourceExW
GetCommandLineW
GetTempPathW
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
ExpandEnvironmentStringsW
CreateEventW
WaitForSingleObject
WideCharToMultiByte
GetLocalTime
GetVolumeInformationA
GlobalAlloc
GlobalFree
CreateFileW
DeviceIoControl
SetLastError
OpenProcess
VirtualAllocEx
ReadProcessMemory
VirtualFreeEx
GetFileAttributesW
GetVersionExW
Sleep
InterlockedExchange
InterlockedCompareExchange
WritePrivateProfileStringW
SystemTimeToFileTime
WriteFile
DeleteFileW
ReadFile
GetFileSizeEx
CreateProcessW
GetCurrentProcess
WTSGetActiveConsoleSessionId
Process32NextW
ProcessIdToSessionId
Process32FirstW
CreateToolhelp32Snapshot
VirtualQueryEx
UnmapViewOfFile
lstrlenA
MapViewOfFile
CreateFileMappingW
GetModuleFileNameW
SizeofResource
GetCurrentProcessId
IsWow64Process
HeapCreate
HeapAlloc
AddVectoredExceptionHandler
SetUnhandledExceptionFilter
RemoveVectoredExceptionHandler
TerminateProcess
SetEndOfFile
SetFilePointer
GetModuleFileNameA
GetModuleHandleA
CreateFileA
GetPrivateProfileSectionW
GetPrivateProfileSectionNamesW
GetTempFileNameW
CreateDirectoryW
MoveFileExW
GetFileSize
GetDiskFreeSpaceExW
GetVolumeInformationW
RemoveDirectoryW
GetDriveTypeW
GetLogicalDrives
OpenFileMappingW
EncodePointer
InitializeCriticalSection
GetStringTypeW
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapDestroy
ExitThread
CreateThread
HeapSetInformation
DecodePointer
GetStartupInfoW
RtlUnwind
GetSystemTimeAsFileTime
GetCPInfo
LCMapStringW
UnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetStdHandle
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
LoadLibraryExW
FindResourceW
VirtualProtect
LoadResource
TlsSetValue
TlsFree
GetLastError
RaiseException
lstrcmpiW
GetModuleHandleW
GetProcAddress
FreeLibrary
lstrlenW
InterlockedDecrement
LocalFree
GetCurrentThreadId
MultiByteToWideChar
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleW
FlushFileBuffers
IsProcessorFeaturePresent
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetLocaleInfoA
GetUserDefaultLCID
GetTickCount
QueryPerformanceCounter
GetAncestor
SetWindowTextW
GetWindowRect
wsprintfW
MonitorFromPoint
GetMonitorInfoW
ClientToScreen
GetWindowThreadProcessId
FindWindowExW
FindWindowW
SendMessageW
EnableWindow
PostThreadMessageW
SetCursor
SetForegroundWindow
PostMessageW
GetMessageW
EndDialog
PostQuitMessage
EndPaint
DefWindowProcW
DialogBoxParamW
DestroyWindow
GetCursorPos
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
LoadAcceleratorsW
RegisterWindowMessageW
CharNextW
BeginPaint
RegEnumKeyExA
RegQueryValueExA
RevertToSelf
CreateProcessAsUserW
OpenProcessToken
DuplicateTokenEx
SetTokenInformation
RegEnumValueW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
RegOpenKeyExA
SHGetFolderPathW
SHFileOperationW
Shell_NotifyIconW
SHGetSpecialFolderPathW
CommandLineToArgvW
OleInitialize
CoInitialize
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoCreateGuid
OleUninitialize
SysAllocString
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
SysFreeString
SysAllocStringLen
SysStringLen
PathFileExistsW
PathAppendW
SHSetValueW
PathIsDirectoryW
PathFindExtensionW
PathGetDriveNumberW
PathStripPathW
PathRemoveExtensionW
PathFindFileNameW
SHGetValueW
PathRemoveFileSpecW
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
GetAdaptersInfo
GetAdaptersAddresses
GetIpForwardTable
GetModuleFileNameExW
GetModuleInformation
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSFreeMemory
WTSEnumerateSessionsW
WTSQueryUserToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ