Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-21_b95b0b558379a7f41fee9513a914e547_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-21_b95b0b558379a7f41fee9513a914e547_mafia.exe
Resource
win10v2004-20240802-en
Target
2024-08-21_b95b0b558379a7f41fee9513a914e547_mafia
Size
5.1MB
MD5
b95b0b558379a7f41fee9513a914e547
SHA1
9b47ca8e02a41fff4cf2b627c64f00ab806deeba
SHA256
26d8f4296fc74002aad6375a24a117b4448521623e3891a31390c614406b51a1
SHA512
6e34a7a5ad3905bc34423ad2ed877218601abd3553116c6df488d933bdc41c0dde7ad00d3e1ac18d3ee91366bc760b8b1bc7c31e42730882e7b513663ad405a6
SSDEEP
49152:zCnZ0c2C4RG2WcMl1Du9pNAhhIuODDvu+3h9mYdh5ZeqeDIs6d57+/cTy1vdZ3PC:WPcUHlUFAhavx3h9XhPeqeDlX3uk
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
S:\workspace\SpeccyNew\trunk\bin\Release\Win32\Speccy.pdb
WTSFreeMemory
WTSQuerySessionInformationW
WTSEnumerateSessionsW
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
GetAdaptersAddresses
HttpAddRequestHeadersW
HttpOpenRequestW
InternetConnectW
InternetReadFile
InternetCrackUrlW
InternetQueryDataAvailable
InternetOpenW
HttpQueryInfoW
InternetCloseHandle
InternetOpenUrlW
HttpSendRequestW
InternetGetConnectedStateExW
FormatMessageA
GetUserDefaultLCID
GetStringTypeExA
GetStringTypeExW
LCMapStringA
LCMapStringW
LoadLibraryA
QueryPerformanceCounter
QueryPerformanceFrequency
InterlockedIncrement
InterlockedDecrement
LoadLibraryExW
lstrcmpiW
FreeLibrary
Sleep
GetPrivateProfileStructW
WritePrivateProfileStructW
CreateEventW
lstrcpynW
SetLastError
MulDiv
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetSystemTimeAsFileTime
WritePrivateProfileStringW
FileTimeToSystemTime
SystemTimeToFileTime
MultiByteToWideChar
DeleteFileW
GetPrivateProfileStringW
WideCharToMultiByte
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
ResetEvent
OpenEventA
SetEvent
GetCurrentProcessId
CreateEventA
WaitForSingleObject
GetModuleFileNameW
GetVersionExW
CloseHandle
GetCurrentProcess
GetModuleHandleW
GetProcAddress
lstrlenW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
CreateWaitableTimerA
GetSystemInfo
GetTickCount
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetWaitableTimer
SetEnvironmentVariableA
SetEndOfFile
SetEnvironmentVariableW
WriteConsoleW
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
GetStdHandle
GetCPInfo
GetDateFormatA
GetTimeFormatA
RtlUnwind
VirtualQuery
VirtualProtect
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
HeapSetInformation
InterlockedPopEntrySList
IsProcessorFeaturePresent
InterlockedPushEntrySList
HeapSize
HeapReAlloc
GetStringTypeW
OutputDebugStringW
VerSetConditionMask
VerifyVersionInfoW
ExpandEnvironmentStringsW
lstrcmpW
CreateProcessA
lstrcmpiA
GetSystemDirectoryA
GetLongPathNameW
GetSystemDirectoryW
GlobalMemoryStatusEx
SetThreadPriority
SetThreadAffinityMask
FindResourceA
GetWindowsDirectoryA
DeleteFileA
RemoveDirectoryA
GetComputerNameA
GetTempPathW
GetWindowsDirectoryW
CreateMutexW
VirtualFree
VirtualAlloc
CompareFileTime
OpenProcess
GetSystemDefaultLCID
GetGeoInfoW
GetUserGeoID
GetSystemPowerStatus
SetErrorMode
GetProcessAffinityMask
SetProcessAffinityMask
ExitThread
CreateFileA
LocalAlloc
GetCurrentDirectoryA
CreateDirectoryA
CreateMutexA
ReleaseMutex
GetVersionExA
GetComputerNameExW
DeviceIoControl
GetDriveTypeW
GetTempPathA
GetModuleHandleA
GlobalMemoryStatus
GetModuleFileNameA
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
CreatePipe
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
ReadFile
InterlockedExchangeAdd
InterlockedCompareExchange
ExitProcess
GetNumberFormatW
GetLocaleInfoW
GlobalFree
InterlockedExchange
FindNextFileW
FindFirstFileW
GetFullPathNameW
FindClose
RemoveDirectoryW
GlobalUnlock
GlobalAlloc
lstrcmpA
SetFileTime
SetFilePointer
GetFileSize
GetFileAttributesExW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
LocalFree
FormatMessageW
DuplicateHandle
GetSystemTime
CreateThread
ResumeThread
CreateSemaphoreW
TerminateThread
InitializeCriticalSection
VirtualQueryEx
SetUnhandledExceptionFilter
RtlCaptureContext
GetCurrentThread
LoadLibraryW
GetTimeFormatW
GetDateFormatW
WaitForMultipleObjects
GlobalLock
CreateSemaphoreA
ReleaseSemaphore
GetComputerNameW
WriteFile
CreateFileW
HeapFree
HeapAlloc
HeapDestroy
HeapCreate
lstrcpyW
CompareStringW
lstrlenA
GetProcessHeap
GetCommandLineW
CreateProcessW
GetStartupInfoW
FlushFileBuffers
GetLocalTime
GetDesktopWindow
SetScrollInfo
GetScrollInfo
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
BeginPaint
EndPaint
SetWindowRgn
DrawEdge
UnregisterClassA
EnumDisplaySettingsExW
EnumDisplayDevicesW
GetUserObjectSecurity
wsprintfA
DrawTextW
IntersectRect
RedrawWindow
SetTimer
KillTimer
GetMessageTime
GetDoubleClickTime
SetCapture
GetWindowLongW
IsWindowVisible
EnumWindows
ReleaseCapture
SetCursor
CreatePopupMenu
LoadIconW
DestroyIcon
LoadImageW
SetWindowLongW
GetWindowRect
SendMessageW
SetDlgItemTextW
GetDlgItem
CheckRadioButton
ShowWindow
ScreenToClient
MoveWindow
LoadStringA
GetClipboardData
IsWindow
IsDlgButtonChecked
EnableWindow
DefWindowProcW
CallWindowProcW
GetParent
SetWindowPos
MapWindowPoints
GetClientRect
GetMonitorInfoW
MonitorFromWindow
GetWindow
SetWindowTextW
DestroyWindow
IsCharAlphaNumericW
GetWindowDC
ReleaseDC
InvalidateRect
IsWindowEnabled
PostMessageW
InflateRect
GetSystemMetrics
SystemParametersInfoW
UpdateWindow
GetKeyState
RegisterClassExW
GetClassInfoExW
LoadCursorW
CreateWindowExW
IsClipboardFormatAvailable
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetDlgItemTextW
BringWindowToTop
CharLowerA
CharLowerW
UnregisterClassW
DrawTextExW
GetSysColorBrush
MapDialogRect
SetWindowPlacement
GetWindowPlacement
GetMenuItemCount
CheckMenuItem
IsIconic
SwitchToThisWindow
TranslateAcceleratorW
MonitorFromRect
EnableMenuItem
GetTopWindow
PostQuitMessage
GetClassLongW
SetClassLongW
DeleteMenu
LoadBitmapW
LoadAcceleratorsW
CheckDlgButton
FillRect
GetSysColor
GetFocus
DrawFocusRect
EndDialog
GetDlgCtrlID
GetCapture
SetRectEmpty
SetFocus
GetSubMenu
GetMenuDefaultItem
IsMenu
SetForegroundWindow
GetCursorPos
CreateIconIndirect
SetMenuDefaultItem
RegisterWindowMessageW
LoadMenuW
InsertMenuItemW
GetMenuItemInfoW
SetMenuItemInfoW
CreateMenu
OffsetRect
CopyRect
TrackPopupMenu
GetClassNameW
GetMenu
GetWindowTextLengthW
GetWindowTextW
LoadStringW
GetForegroundWindow
DialogBoxParamW
CreateDialogParamW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
RegisterClassW
GetClassInfoW
GetActiveWindow
MessageBoxW
CharNextW
FindWindowW
CallNextHookEx
SetWindowsHookExW
UnhookWindowsHookEx
GetKeyboardState
DestroyCursor
PtInRect
GetDC
MonitorFromPoint
DestroyMenu
AppendMenuW
ShowScrollBar
EndPage
StartPage
GetBitmapBits
CreatePatternBrush
Ellipse
SetBitmapDimensionEx
GetBitmapDimensionEx
SetBkMode
CreateBitmap
Polyline
DPtoLP
GetDeviceCaps
GetTextMetricsW
CreateFontIndirectW
Rectangle
GetTextColor
GetBkColor
GetCurrentObject
SetPixel
LineTo
AbortDoc
RoundRect
GetStockObject
CreatePen
ExtTextOutW
CreateRoundRectRgn
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SetViewportOrgEx
CreateSolidBrush
GetTextExtentExPointW
GetTextExtentPoint32W
TextOutW
SetBkColor
RestoreDC
SaveDC
SetTextColor
SelectObject
DeleteDC
GetObjectW
CreateDIBSection
DeleteObject
EndDoc
StartDocW
StretchBlt
GetDIBColorTable
CreateDCW
ExtEscape
SetDIBColorTable
MoveToEx
GetSaveFileNameW
PrintDlgExW
GetOpenFileNameW
RegSetValueExW
RegCreateKeyExW
RegCreateKeyW
RegDeleteKeyW
InitializeSecurityDescriptor
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetTokenInformation
OpenProcessToken
GetUserNameW
AllocateAndInitializeSid
FreeSid
OpenSCManagerW
EnumServicesStatusExW
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
RegEnumKeyExW
RegQueryInfoKeyW
SetSecurityDescriptorDacl
CloseServiceHandle
RegEnumValueW
RegQueryValueExA
OpenServiceW
QueryServiceConfigW
EnumServicesStatusW
OpenThreadToken
ImpersonateSelf
LookupAccountSidW
GetSecurityDescriptorOwner
IsValidSid
LookupPrivilegeValueW
AdjustTokenPrivileges
GetSidSubAuthorityCount
GetSidLengthRequired
InitializeSid
GetSidIdentifierAuthority
GetSidSubAuthority
LsaOpenPolicy
LsaQueryInformationPolicy
LsaFreeMemory
CreateServiceA
DeleteService
OpenServiceA
StartServiceA
ControlService
OpenSCManagerA
RegOpenKeyExA
ConvertStringSidToSidW
RegLoadKeyW
RegUnLoadKeyW
CreateServiceW
StartServiceW
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegDeleteValueW
DoEnvironmentSubstW
SHGetSpecialFolderPathW
SHGetFolderPathA
ShellExecuteExW
ShellExecuteW
Shell_NotifyIconW
DragFinish
DuplicateIcon
DragQueryFileW
CoInitializeSecurity
CoUninitialize
CreateStreamOnHGlobal
CoSetProxyBlanket
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
PropVariantClear
CoInitializeEx
CoCreateInstance
CoTaskMemFree
SysFreeString
VariantTimeToSystemTime
SysAllocStringByteLen
SafeArrayAccessData
SafeArrayGetVartype
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SafeArrayGetElement
SysStringByteLen
VariantInit
VariantClear
SysAllocString
SystemTimeToVariantTime
SysStringLen
SysAllocStringLen
VarUI4FromStr
VariantChangeType
VarBstrFromR8
VarUdateFromDate
VariantCopy
UuidToStringW
RpcStringFreeW
UuidCreate
SetupDiGetDeviceRegistryPropertyA
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstanceIdW
SetupDiOpenDevRegKey
SetupDiBuildDriverInfoList
SetupDiDestroyDriverInfoList
SetupDiGetSelectedDriverW
SetupDiSetSelectedDriverW
SetupDiGetDeviceInstallParamsW
SetupDiEnumDeviceInfo
SetupDiCallClassInstaller
CM_Get_DevNode_Registry_PropertyW
CM_Open_DevNode_Key
CM_Get_Parent
SetupOpenFileQueue
SetupCloseFileQueue
SetupScanFileQueueW
SetupDiDestroyDeviceInfoList
SetupDiSetDeviceInstallParamsW
CM_Get_Sibling_Ex
SetupDiGetClassDevsW
CM_Connect_MachineW
CM_Locate_DevNode_ExW
CM_Get_Child_Ex
CM_Get_DevNode_Registry_Property_ExW
GetActivePwrScheme
ReadPwrScheme
GetPwrCapabilities
GetProcessImageFileNameW
GetProcessMemoryInfo
GetModuleFileNameExW
waveInGetDevCapsW
waveOutGetDevCapsW
waveInMessage
waveOutMessage
waveOutGetNumDevs
waveInGetNumDevs
NetUserModalsGet
NetWkstaGetInfo
NetUserGetInfo
NetApiBufferFree
PathIsDirectoryEmptyW
PathFindFileNameA
PathCombineW
PathCanonicalizeW
StrFormatByteSizeW
PathMatchSpecW
PathAddExtensionW
PathAppendW
PathFileExistsW
PathRemoveExtensionW
PathIsDirectoryW
PathRemoveFileSpecW
PathStripPathW
GdipGetImageHeight
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipDisposeImage
GdipFree
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromScan0
GdiplusShutdown
GdiplusStartup
GdipCreateBitmapFromStream
GdipGetImagePixelFormat
GdipBitmapUnlockBits
GdipDrawImageI
GdipBitmapLockBits
GdipGetImageWidth
GdipGetImagePaletteSize
GdipGetImagePalette
TransparentBlt
AlphaBlend
CreatePropertySheetPageW
_TrackMouseEvent
InitCommonControlsEx
PropertySheetW
DestroyPropertySheetPage
CryptDecodeObject
CryptMsgGetParam
CertGetNameStringW
CertFindCertificateInStore
CryptQueryObject
CryptMsgClose
CertCloseStore
CertFreeCertificateContext
WinVerifyTrust
WSALookupServiceNextW
WSALookupServiceBeginW
getnameinfo
htons
WSAAddressToStringW
inet_ntoa
htonl
WSALookupServiceEnd
WSAStartup
WSACleanup
WSAGetLastError
inet_addr
ClosePrinter
GetPrinterDriverW
OpenPrinterW
EnumPrintersW
ord203
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ