Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-17_05f53adb723aae17a8df69a8ff47e303_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-17_05f53adb723aae17a8df69a8ff47e303_mafia.exe
Resource
win10v2004-20241007-en
Target
2024-10-17_05f53adb723aae17a8df69a8ff47e303_mafia
Size
545KB
MD5
05f53adb723aae17a8df69a8ff47e303
SHA1
acdd0e34963f3fe92f0b1809a8923efa90fe21db
SHA256
0e3c0a493f1bbc91d6f5ebc469564d84a2331b006d746cbe551aead106a1c8c8
SHA512
8909a11af3e9ecc590dbe797dfced09522e8b826270f723702710142e85e8771cf02f19d08451f7bb649954489c2e9842a9d5ba08e5f53f665adee00090a1c74
SSDEEP
12288:rX9HBQo1bNQh9ugF37duNTOZE6MtPlsKBV244zAt7Bw/tO7Ehy/IF485/pfLfqnM:rXtBQjcOZE6MtPGKBQ44Y7OtpfLf+uSa
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\dev\tags\rev-4.09\apps\win\Release\Win32\FBWMgr.pdb
GetModuleFileNameExW
GetProcessMemoryInfo
GetProcAddress
FreeLibrary
GetStartupInfoW
CreateProcessW
OpenProcess
GetExitCodeProcess
CreateMutexW
GetCommandLineW
SetConsoleCtrlHandler
Sleep
TlsFree
CloseHandle
TlsAlloc
PostQueuedCompletionStatus
InterlockedExchangeAdd
EnterCriticalSection
GetLastError
InterlockedExchange
LeaveCriticalSection
SetEvent
CreateEventA
LoadLibraryW
InterlockedIncrement
GetCurrentProcessId
ProcessIdToSessionId
GetTempPathW
CreateWaitableTimerA
ResumeThread
ResetEvent
OpenEventA
FormatMessageA
LocalFree
SetEndOfFile
SetStdHandle
CreateFileA
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
InterlockedDecrement
GetModuleFileNameW
HeapSize
ExitProcess
FindResourceExW
FindResourceW
LoadResource
SizeofResource
CreateFileW
LockResource
DeleteFileW
GetFileSize
SetFilePointer
GetModuleHandleW
WriteFile
ReadFile
FlushFileBuffers
MultiByteToWideChar
WideCharToMultiByte
SystemTimeToFileTime
GetVolumeInformationW
GetProcessHeap
HeapFree
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
CreateIoCompletionPort
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
QueueUserAPC
TerminateThread
GetQueuedCompletionStatus
SetWaitableTimer
ReleaseSemaphore
CreateSemaphoreA
TlsSetValue
TlsGetValue
InterlockedCompareExchange
SetLastError
WaitForSingleObject
WaitForMultipleObjects
SleepEx
CreateEventW
DuplicateHandle
GetCurrentProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
TerminateProcess
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
HeapSetInformation
WriteConsoleW
GetFileType
GetStdHandle
ExitThread
GetCurrentThreadId
CreateThread
HeapReAlloc
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetLocaleInfoW
HeapCreate
HeapDestroy
GetACP
GetOEMCP
IsValidCodePage
GetForegroundWindow
GetWindowTextLengthW
GetWindowThreadProcessId
EnumChildWindows
PostMessageA
SetWindowPos
SetForegroundWindow
IsIconic
ShowWindow
GetKeyboardState
keybd_event
GetWindowRect
FindWindowExW
GetClassNameW
GetWindowTextW
IsWindow
IsWindowVisible
RegDeleteValueW
RegQueryValueExW
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
GetUserNameW
RegSetValueExW
CommandLineToArgvW
SHGetFolderPathW
PathAddBackslashW
PathFileExistsW
htons
setsockopt
ioctlsocket
WSASend
WSASetLastError
WSAGetLastError
WSAStringToAddressA
ntohs
closesocket
shutdown
getsockname
bind
listen
ntohl
gethostname
WSAStartup
WSACleanup
htonl
WSASocketW
getsockopt
select
connect
getaddrinfo
freeaddrinfo
WSARecv
GetAcceptExSockaddrs
AcceptEx
GetAdaptersInfo
InternetCrackUrlA
CoCreateInstance
VariantInit
SysAllocString
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ