Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-17_5041f846bfbe924c2618b8aee4b582f2_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-17_5041f846bfbe924c2618b8aee4b582f2_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-06-17_5041f846bfbe924c2618b8aee4b582f2_mafia
Size
291KB
MD5
5041f846bfbe924c2618b8aee4b582f2
SHA1
985b7db15704e41b874308f9c21e9482cec59838
SHA256
92a1b4180ffed34a3e561275cf5e7dde3e6e8e70e12675bd08771d0127bc1f75
SHA512
6d89ec4bad2065b819412e1114862ad09a4bcd2af90ce65aa4bc717a06f305c3fb575cfaf87aab5d42901d7567f778b47a9def737917c600edde4d65cd5cb9bf
SSDEEP
6144:L20EYobNZkxwpdpsZmCO6bsqAeMn35mv8J+lFa+q:Q/JkwDiZmCOGsqe35mksl01
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\数据\MyCode\广告过滤\Release\Launcher.pdb
GetCurrentProcess
CreateDirectoryA
DeleteFileA
ExitProcess
Sleep
CreateProcessA
GetModuleFileNameW
GetVersionExW
OutputDebugStringA
GetLastError
CreateThread
OpenMutexW
CreateMutexW
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
DecodePointer
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
SetStdHandle
WriteConsoleW
LoadLibraryW
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetProcAddress
lstrlenA
MultiByteToWideChar
InterlockedDecrement
CloseHandle
FindFirstFileA
EncodePointer
GetModuleFileNameA
GetACP
GetLocaleInfoW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
ReadFile
SetFilePointer
GetConsoleMode
WideCharToMultiByte
LocalFree
GetSystemTimeAsFileTime
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapFree
GetFileAttributesA
MoveFileA
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
GetStdHandle
HeapCreate
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetConsoleCP
TrackPopupMenu
SetForegroundWindow
GetCursorPos
DefWindowProcW
CreateWindowExW
RegisterClassExW
LoadCursorW
DispatchMessageW
PostQuitMessage
GetMessageW
LoadIconW
AppendMenuW
CreatePopupMenu
PostMessageW
MessageBoxW
TranslateMessage
RegCloseKey
RegSetValueExA
RegCreateKeyW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ConvertStringSecurityDescriptorToSecurityDescriptorW
CoCreateInstance
CoInitialize
CLSIDFromProgID
ShellExecuteExW
Shell_NotifyIconW
SysAllocString
VariantClear
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ