Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_d07adc7f41e5675b70e4168ae071b009_mafia.exe
Resource
win7-20240903-en
Target
2024-09-19_d07adc7f41e5675b70e4168ae071b009_mafia
Size
2.9MB
MD5
d07adc7f41e5675b70e4168ae071b009
SHA1
c0c3a71aed87b233351ca2e888d0ef0d999a7c14
SHA256
a19098527b5e74997b3895149453493a994fefaadfc0701035e91c9b3a90d868
SHA512
ef4efb029daca1eadb0168b28bd38b823cedf0eb6ef015e8d21728c5fef035110a8d2390972df65527d71b62b3aaab24f8e027e40eb9aed7fa59f10caf494fcc
SSDEEP
49152:SOfMU2iQtrWofmEaCp01a9Ac7V+oz+Q00azUu3f5RaSFEy++EzR7/i5tG:XMZrWjtC19N7VGJ/3RRaSFp+DX
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\code\p4\david.paxson_dp6127437787DT\Developers\David.Paxson\ChromeSearch\Build.TT\Release.x86\t8CrxSetup.pdb
GetCharWidth32A
GetTextExtentPoint32A
InternetCloseHandle
InternetOpenUrlA
InternetGetConnectedState
InternetOpenA
InternetReadFile
NetUserEnum
NetApiBufferFree
NetWkstaUserGetInfo
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
MultiByteToWideChar
GetTempFileNameA
GetTempPathA
FreeResource
CloseHandle
WriteFile
CreateFileA
SetFileAttributesA
LockResource
LoadResource
SizeofResource
FindResourceA
GetSystemTime
GetProcAddress
GetModuleHandleA
CopyFileA
FreeLibrary
LoadLibraryA
lstrcpyW
SetFilePointer
ReadFile
FileTimeToSystemTime
GetVersionExA
GetCurrentProcess
DeleteFileA
RemoveDirectoryA
GetLastError
CreateDirectoryA
SetLastError
CreateThread
CreateEventA
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateRemoteThread
GetExitCodeProcess
DuplicateHandle
lstrcmpiW
OpenProcess
LocalFree
CreateProcessA
SetEvent
CreateMutexA
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
LoadLibraryExA
lstrcmpiA
IsDBCSLeadByte
RaiseException
WaitForMultipleObjects
FlushFileBuffers
GetTickCount
lstrcatW
GetFileSize
MoveFileA
GetModuleFileNameA
GetWindowsDirectoryA
CreateFileW
FindFirstFileW
lstrcmpW
FindNextFileW
FindClose
lstrcpynW
LoadLibraryExW
GetDriveTypeW
GetFileAttributesW
RtlUnwind
HeapFree
EncodePointer
DecodePointer
HeapAlloc
ExitThread
GetCurrentThreadId
VirtualProtect
VirtualAlloc
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
IsProcessorFeaturePresent
HeapCreate
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameW
GetLocaleInfoW
HeapReAlloc
GetTimeZoneInformation
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
InterlockedExchange
LoadLibraryW
SetStdHandle
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
WideCharToMultiByte
lstrcatA
lstrlenW
lstrcpyA
lstrcpynA
GetDriveTypeA
GetFileAttributesA
lstrlenA
GetShortPathNameA
LocalAlloc
wsprintfA
PostQuitMessage
PostMessageA
IsWindow
DialogBoxParamA
EndDialog
GetMessageA
TranslateMessage
DispatchMessageA
PostThreadMessageA
GetWindowLongA
SetWindowLongA
GetClientRect
SetWindowPos
SetWindowTextA
CharNextA
GetParent
SendMessageA
DestroyIcon
GetWindowRect
MapWindowPoints
GetDC
ReleaseDC
MoveWindow
SetDlgItemTextA
GetDlgItem
MessageBoxA
RegCloseKey
RegEnumKeyExA
RegDeleteKeyA
RegFlushKey
RegQueryInfoKeyW
OpenProcessToken
DuplicateTokenEx
GetLengthSid
SetTokenInformation
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
CreateProcessAsUserA
CLSIDFromString
CoUninitialize
CoInitialize
CoInitializeEx
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CreateBindCtx
VariantClear
CreateStdDispatch
CreateDispTypeInfo
VariantInit
LoadTypeLi
VarUI4FromStr
SysStringLen
SysAllocString
SysFreeString
LoadRegTypeLi
SysAllocStringLen
StrCmpNIW
PathAppendA
PathCombineW
PathFileExistsW
PathAppendW
StrStrIW
StrNCatW
PathFileExistsA
RegisterBindStatusCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ