Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-08_10c43feb8b300d6cc77787488ddcb1fa_mafia.exe
Behavioral task
behavioral2
Sample
2024-07-08_10c43feb8b300d6cc77787488ddcb1fa_mafia.exe
Target
2024-07-08_10c43feb8b300d6cc77787488ddcb1fa_mafia
Size
421KB
MD5
10c43feb8b300d6cc77787488ddcb1fa
SHA1
6bbee2d321da9cdeab913a0017139a74f66729bc
SHA256
f4332e22af528bdecbb5ee48b2eec637a48e395ba32266c522bba1f02059679b
SHA512
057543d5beef69befa5215d03f593abcd74fed5c7f5d9ef8377303f64a094afb58f69d972b75bec973b15623461889723c267fcf5024e53f7fb01b35e97f1f4b
SSDEEP
12288:uJsEbr43kXNlZQh5PDpb+vUioC0+oqMpUkmIw8kxfBT:uGEbU3jhxcP0FqSXM8kxJT
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\b5m-client-search\ruyiso\RYSProject\bin\Release\NaMsgHost\pdb\B5MRysNaMsgHost.pdb
WriteFile
Sleep
ReadFile
DisconnectNamedPipe
CreateNamedPipeW
CreateEventW
CreateThread
CreateProcessW
SetEndOfFile
ConnectNamedPipe
SetEvent
WaitForSingleObject
CloseHandle
GetLocalTime
GlobalFree
GetProcAddress
GetLastError
lstrlenW
MultiByteToWideChar
LoadLibraryW
WideCharToMultiByte
GetModuleHandleW
OutputDebugStringW
FreeLibrary
FlushFileBuffers
CreateMutexW
LocalFree
lstrlenA
DeviceIoControl
SetEnvironmentVariableA
CompareStringW
CreateFileW
SetStdHandle
SetFilePointer
GetConsoleMode
GetConsoleCP
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
QueryPerformanceCounter
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteFileA
GetCurrentProcess
WTSGetActiveConsoleSessionId
CreateFileA
OutputDebugStringA
TerminateProcess
GetExitCodeProcess
GetModuleFileNameW
GetVersionExW
FindClose
FindFirstFileW
GetTickCount
FindFirstFileA
CopyFileA
GetSystemTime
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
ExitProcess
ExitThread
GetCurrentThreadId
GetCommandLineW
HeapSetInformation
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
WriteConsoleW
GetFileType
GetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetTimeZoneInformation
IsProcessorFeaturePresent
HeapCreate
HeapSize
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoW
GetProcessHeap
FindWindowW
wsprintfW
SendMessageW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
SHCreateDirectoryExA
SHGetFolderLocation
SHGetPathFromIDListW
ord155
ShellExecuteExW
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpSetTimeouts
WinHttpSetOption
WinHttpWriteData
WinHttpConnect
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpGetIEProxyConfigForCurrentUser
WinHttpOpenRequest
WinHttpOpen
WinHttpAddRequestHeaders
WinHttpReadData
WinHttpCrackUrl
WinHttpQueryDataAvailable
WinHttpGetProxyForUrl
GetModuleBaseNameA
WTSQueryUserToken
CoTaskMemFree
CoInitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
SysFreeString
VariantInit
VariantClear
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ