Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-01_8353394b6632bf3e5143c820d68cb6b3_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-01_8353394b6632bf3e5143c820d68cb6b3_mafia.exe
Resource
win10v2004-20240802-en
Target
2024-09-01_8353394b6632bf3e5143c820d68cb6b3_mafia
Size
2.0MB
MD5
8353394b6632bf3e5143c820d68cb6b3
SHA1
0c1191bb2b144b2fdbf0f0b85da0d2b277afbc4b
SHA256
a30a5c903eda7711aabff10e8bb57e9a04927d9a1e8c41895fd4754070f8b2c3
SHA512
6332e3ff3f9b88d25b1aea1b2c0bddbe77258def6e12868b556594c16153e4e37a98ec3044e7f4c6439ca19a1b327df8a33266b4a5a862d32813b73d391178ac
SSDEEP
24576:5wTqNyQ4VbtTS5zkLpQfuH8ulSeSQpUE/WxLM7wV/1mDZdnGDUON50YDFyNQCC3B:5wTqNyQ4VbtTSTwUSWxVQ1dGAA0YDFPz
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\buildbot\slaves\ad_aware_antivirus\ad_aware_antivirus\build\_build\bin\Win32\Release\AdAwareWebInstaller.pdb
setsockopt
WSAIoctl
send
recv
getsockname
WSAGetLastError
__WSAFDIsSet
WSASetLastError
WSAStartup
ntohs
bind
htons
getsockopt
getpeername
closesocket
socket
connect
freeaddrinfo
getaddrinfo
sendto
recvfrom
accept
gethostname
listen
ioctlsocket
select
WSACleanup
SHGetFolderPathW
CommandLineToArgvW
CryptCreateHash
CryptHashData
CryptReleaseContext
RegCreateKeyExW
RegCloseKey
RegSetValueExW
CryptDestroyHash
CryptGetHashParam
CryptAcquireContextA
CopyFileW
GetModuleFileNameW
TlsGetValue
InitializeCriticalSection
TlsSetValue
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
TlsAlloc
GetCurrentProcessId
GetCommandLineW
FindResourceW
LoadResource
GlobalLock
GlobalAlloc
SizeofResource
GlobalUnlock
GlobalFree
LockResource
lstrlenA
WaitForSingleObject
WideCharToMultiByte
GetProcessHeap
HeapAlloc
CreateEventA
HeapFree
SetEvent
MultiByteToWideChar
lstrlenW
GetLastError
CloseHandle
GetCurrentProcess
GetModuleHandleW
GetProcAddress
EndUpdateResourceW
BeginUpdateResourceW
UpdateResourceW
MapViewOfFile
ExitProcess
WriteFile
CreateFileW
GetFileSizeEx
CreateFileMappingW
GetDriveTypeA
FormatMessageA
FormatMessageW
LocalFree
LocalAlloc
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetProcessTimes
CreateMutexW
CreateDirectoryW
GetFileInformationByHandle
GetCurrentDirectoryW
GetFileAttributesW
DeviceIoControl
DeleteFileW
RemoveDirectoryW
FindClose
SetEndOfFile
GetLocaleInfoW
Sleep
DecodePointer
EncodePointer
GetStringTypeW
InterlockedCompareExchange
InterlockedDecrement
InterlockedIncrement
RaiseException
LoadLibraryA
SetLastError
AreFileApisANSI
GetTempPathW
GetModuleHandleA
GetVersionExW
FindFirstFileExA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateThread
ExitThread
InterlockedExchange
HeapSetInformation
FreeLibrary
GetCPInfo
HeapSize
HeapReAlloc
GetFullPathNameA
UnmapViewOfFile
GetDriveTypeW
GetStartupInfoW
ReadFile
RtlUnwind
ExpandEnvironmentStringsA
WaitForMultipleObjects
PeekNamedPipe
VerSetConditionMask
VerifyVersionInfoA
SleepEx
LCMapStringA
GetStringTypeExW
GetStringTypeExA
CreateWaitableTimerA
SetWaitableTimer
WaitForMultipleObjectsEx
SystemTimeToFileTime
ResumeThread
ResetEvent
OpenEventA
WaitForSingleObjectEx
ReleaseSemaphore
SetEnvironmentVariableA
CreateFileA
LCMapStringW
GetTimeFormatA
GetDateFormatA
CompareStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WriteConsoleW
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
GetTimeZoneInformation
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapDestroy
HeapCreate
GetFileType
SetHandleCount
GetStdHandle
TlsFree
LoadLibraryW
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
IsDebuggerPresent
LoadStringA
SendMessageW
ReleaseCapture
DispatchMessageW
DefWindowProcW
LoadStringW
GetWindowRect
GetParent
GetClientRect
MonitorFromWindow
SetWindowPos
MapWindowPoints
GetMonitorInfoW
GetWindow
SetCursor
UpdateLayeredWindow
ScreenToClient
GetMessageW
PostQuitMessage
PostMessageW
LoadCursorW
GetDC
TranslateMessage
RegisterClassExW
LoadIconW
GetWindowLongW
ReleaseDC
SetWindowLongW
GetCursorPos
ShowWindow
GetSysColorBrush
CreateWindowExW
CreateDIBSection
DeleteObject
SelectObject
CreateCompatibleDC
DeleteDC
CreateStreamOnHGlobal
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
SysAllocString
VariantClear
VariantInit
SysAllocStringLen
SysFreeString
VariantCopy
GdipCreateBitmapFromStream
GdiplusShutdown
GdipGetImageWidth
GdipCreatePath
GdipFillRectangleI
GdipFillPath
GdipCreateFromHDC
GdipCreateFontFamilyFromName
GdipDeletePath
GdipDisposeImage
GdipAlloc
GdipCreateSolidFill
GdipDeleteFontFamily
GdipSetSmoothingMode
GdipDrawImageRectI
GdipDeleteGraphics
GdipGetImageHeight
GdipCloneBrush
GdipFree
GdipDeleteBrush
GdipCloneImage
GdipAddPathStringI
GdiplusStartup
InternetSetOptionW
HttpQueryInfoW
InternetReadFile
InternetConnectW
HttpSendRequestW
InternetOpenW
HttpOpenRequestW
InternetCloseHandle
ord301
ord41
ord27
ord33
ord200
ord79
ord35
ord32
ord30
ord26
ord50
ord60
ord143
ord211
ord22
ord46
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ