Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-14_70711b7df27134bf856190cf87c180e6_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-14_70711b7df27134bf856190cf87c180e6_mafia.exe
Resource
win10v2004-20240611-en
Target
2024-06-14_70711b7df27134bf856190cf87c180e6_mafia
Size
496KB
MD5
70711b7df27134bf856190cf87c180e6
SHA1
f94debd29da4832e97fc6743fac9bf602cd6b631
SHA256
ef59fd767dddd615d7afe963fcbbadcae81c0d2de8486ee63fe2a621ae3a9da1
SHA512
829f9494894fa75a85f9c242bd680c07abd35ff8c96da4f06a1e2f200c468553ff102f2a6d6ce9fc4839ccce91663d373982e842e0cfded3aec677f4b4144957
SSDEEP
12288:xIXQomOl0CQEwYyWPI+jzoFohYwX2rYfHhu7nZlEr2TXrVlxnQqM:xIXBmOl0CQEw7WPI+fTOwpHhAZlEsXr6
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\bld_area\SEP_12.1\Output\Install\Bin.iru\SylinkDrop.pdb
GetModuleBaseNameW
EnumProcessModules
EnumProcesses
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetModuleHandleW
GetProcAddress
GetCurrentProcess
GetSystemDirectoryW
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
GetLastError
lstrlenA
CloseHandle
CreateFileW
ReadFile
InterlockedDecrement
LoadLibraryW
FreeLibrary
DeleteFileW
MoveFileW
WaitForSingleObject
GetModuleFileNameW
GetFileSize
WriteFile
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateProcessW
GetExitCodeProcess
GetFileAttributesW
Sleep
GetEnvironmentVariableW
SetFilePointer
CopyFileW
GetVersionExW
HeapFree
GetProcessHeap
VirtualFree
HeapSize
HeapAlloc
VirtualAlloc
GetSystemInfo
HeapReAlloc
InterlockedIncrement
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
TlsSetValue
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
DeleteCriticalSection
EnterCriticalSection
TryEnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
OutputDebugStringW
InterlockedExchange
InterlockedCompareExchange
VerifyVersionInfoW
VerSetConditionMask
GetCurrentThread
LoadLibraryExW
GetWindowsDirectoryW
GetCurrentDirectoryW
GetShortPathNameW
GetLongPathNameW
GetCurrentProcessId
DuplicateHandle
ReleaseSemaphore
CreateSemaphoreW
OpenSemaphoreW
SetEvent
PulseEvent
ResetEvent
CreateEventW
OpenEventW
WaitForMultipleObjects
GetTickCount
WaitForMultipleObjectsEx
GetACP
GetCPInfo
HeapDestroy
HeapCreate
GetModuleHandleA
FlushFileBuffers
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetStdHandle
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetLocaleInfoW
VirtualQuery
GetSystemTimeAsFileTime
GlobalFree
FormatMessageA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetConsoleMode
GetConsoleCP
SetHandleCount
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetCurrentThreadId
SetLastError
ExitProcess
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetFileType
RaiseException
LoadLibraryA
LocalFree
LocalAlloc
TlsFree
GetMessageW
MessageBoxW
SetDlgItemTextW
FindWindowW
MessageBeep
EndDialog
GetDlgItemTextW
DialogBoxParamW
GetSystemMetrics
GetMessageA
IsWindowUnicode
MsgWaitForMultipleObjectsEx
PeekMessageW
DispatchMessageW
TranslateMessage
DispatchMessageA
GetOpenFileNameW
CoCreateInstance
CoInitialize
CoUninitialize
IIDFromString
OleLoadFromStream
CreateStreamOnHGlobal
GetHGlobalFromStream
OleSaveToStream
StringFromGUID2
CLSIDFromString
SafeArrayCreate
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayGetElement
SafeArrayUnlock
SafeArrayRedim
VariantCopyInd
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
VariantInit
VariantClear
SysFreeString
SysStringByteLen
SysAllocStringByteLen
SysAllocString
GetErrorInfo
SafeArrayLock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ