Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-08_74bd99fac6e8582279e60a7621c13580_mafia.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-08_74bd99fac6e8582279e60a7621c13580_mafia.exe
Resource
win10v2004-20240802-en
Target
2024-09-08_74bd99fac6e8582279e60a7621c13580_mafia
Size
2.0MB
MD5
74bd99fac6e8582279e60a7621c13580
SHA1
70763309bab38b34307b6e9d85d7def428cc744b
SHA256
c6f9587904fc4f3be31a2d2160fe448650766aa64f415d92b1fd82135cb25161
SHA512
9bb29c992367d3fa11147906e262610994dba6902c81933bb29216b02528f4481859cb15579d6e16005c50032d101d41d706b2e2c478f31c94a3760adcebf741
SSDEEP
24576:m5SPUSwrLJR4zoExUwGI0kJ6ROURiHRenh3LJo1+0Bhy+DHj7nd3tnpYPDy8rxdC:mBSwrLS1AjRiHULuYKjbTnWLVBD4Vb
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Work\soft365\MakerV4\Release\SoftStudio.pdb
connect
WSAStartup
gethostname
ioctlsocket
select
__WSAFDIsSet
listen
accept
recvfrom
sendto
getaddrinfo
freeaddrinfo
WSASetLastError
WSACleanup
setsockopt
getpeername
getsockopt
htons
bind
ntohs
getsockname
send
recv
socket
closesocket
WSAGetLastError
ord41
ord46
ord22
ord211
ord143
ord60
ord50
ord26
ord30
ord32
ord35
ord79
ord200
ord33
ord301
ord27
PathAppendW
SHRegGetUSValueW
PathFileExistsW
MakeSureDirectoryPathExists
GetConsoleCP
HeapCreate
InitializeCriticalSectionAndSpinCount
SetHandleCount
TlsFree
IsValidCodePage
GetOEMCP
GetACP
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
GetConsoleMode
ExitThread
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
HeapReAlloc
RtlUnwind
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineW
HeapAlloc
HeapFree
InterlockedExchange
DecodePointer
EncodePointer
InterlockedDecrement
CreateThread
WideCharToMultiByte
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteFileW
GetPrivateProfileSectionNamesW
lstrcmpA
GetPrivateProfileStringW
MultiByteToWideChar
GetEnvironmentVariableW
FindFirstFileW
MoveFileExW
GetCurrentProcess
CreateDirectoryW
WaitForSingleObject
GetModuleHandleW
WriteFile
InitializeCriticalSection
CopyFileW
GetVersionExW
GetFileAttributesW
TerminateProcess
GetModuleFileNameW
CreateFileW
GetProcAddress
MoveFileW
GetLocaleInfoW
FindNextFileW
DeleteCriticalSection
CloseHandle
FreeResource
FindResourceW
LoadResource
CreateProcessW
SizeofResource
GetStdHandle
GetLastError
LockResource
GetFileSize
SetFilePointer
UnmapViewOfFile
SystemTimeToFileTime
GetTickCount
FileTimeToSystemTime
ReadFile
GetLocalTime
GetFileInformationByHandle
FindClose
SetFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
CreateFileA
DeviceIoControl
GetVolumeInformationW
GetSystemDefaultLangID
GetProcessHeap
GetSystemInfo
lstrcmpiW
ExpandEnvironmentStringsA
SetLastError
SleepEx
FormatMessageA
PeekNamedPipe
WaitForMultipleObjects
GetFileType
FreeLibrary
LoadLibraryA
GetFullPathNameW
GetFullPathNameA
TlsGetValue
SetEndOfFile
InterlockedIncrement
UnlockFile
LockFile
GetSystemTimeAsFileTime
TlsSetValue
GetFileAttributesA
FlushFileBuffers
GetTempPathW
LockFileEx
GetCurrentThreadId
TlsAlloc
GetTempPathA
GetSystemTime
DeleteFileA
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
SetStdHandle
GetTimeZoneInformation
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
LoadLibraryW
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetDriveTypeW
ExitProcess
SendMessageW
GetClassNameW
EnumWindows
FindWindowW
GetDesktopWindow
wsprintfW
GetSystemMetrics
CryptDuplicateKey
CryptAcquireContextW
RegOpenKeyExW
GetUserNameW
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
CryptEncrypt
CryptCreateHash
CryptDestroyKey
CryptDecrypt
CryptDestroyHash
CryptHashData
CryptDeriveKey
ShellExecuteW
SHGetFolderPathW
ShellExecuteExW
_sqlite3_key_interop@12
_sqlite3_rekey_interop@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ