Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-13_df333d85d5056d415822997eaceec252_floxif_mafia.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-13_df333d85d5056d415822997eaceec252_floxif_mafia.exe
Resource
win10v2004-20241007-en
Target
2024-12-13_df333d85d5056d415822997eaceec252_floxif_mafia
Size
2.5MB
MD5
df333d85d5056d415822997eaceec252
SHA1
93dea5ac23b6888b9ec3bc7857dfc79a7847a46b
SHA256
1d7438e97e2df9baf14c6d7c34771e9c0fe62467767a79c2018488f6e4741d68
SHA512
c1e1ba98e6461bc1894800051f27ae2452f1cdf3546e73cbc2ad297a2c32cc1d2312a73a38c6c2c2f83e119ae910328e8ff4eb42f4d073a6163ca56e750a7c7c
SSDEEP
49152:pmhcbMDOyZLivN3iK0fqOw7XYym7U4aFvsO1CThFhu7vLruwqf+ty:pmpiyZuvN3GiOw7XSU4aFvsO1X7v+
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\dvs\p4\build\sw\rel\gfclient\rel\backend\build\bin\Win32\Release\NvBackend.pdb
IcmpCloseHandle
IcmpSendEcho
IcmpCreateFile
ntohl
accept
WSAWaitForMultipleEvents
listen
send
gethostbyname
WSAResetEvent
closesocket
WSACloseEvent
WSACreateEvent
inet_addr
WSAStartup
WSACleanup
socket
getsockname
shutdown
setsockopt
__WSAFDIsSet
bind
recv
sendto
WSAEventSelect
htons
WSAEnumNetworkEvents
WSAGetLastError
htonl
connect
ioctlsocket
select
GlobalMemoryStatusEx
GetUserDefaultUILanguage
GetCommandLineW
WaitForSingleObject
WriteFile
Sleep
GetStdHandle
GetVersionExW
GetExitCodeProcess
GetCurrentThread
SetThreadAffinityMask
GetSystemPowerStatus
SystemTimeToFileTime
SetHandleInformation
GetProcessTimes
ReadFile
CreatePipe
CreateDirectoryW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleA
GetNativeSystemInfo
ExitProcess
GetSystemTimeAsFileTime
DeleteFileW
FindNextFileW
IsWow64Process
FindClose
GetFileAttributesW
GetLogicalDrives
GetCurrentProcess
GetDriveTypeW
FindFirstFileW
ExpandEnvironmentStringsW
LocalFree
CloseHandle
LocalAlloc
GetProcAddress
SetLastError
GetLastError
VerifyVersionInfoW
lstrcmpW
CreateFileW
GetModuleFileNameW
GetSystemDirectoryW
GetModuleHandleW
VerSetConditionMask
LoadLibraryExW
CreateProcessW
FreeLibrary
GetFullPathNameW
OpenEventW
InterlockedCompareExchange
SetEnvironmentVariableA
GetTimeZoneInformation
CompareStringW
HeapReAlloc
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentDirectoryW
CreateFileA
GetFullPathNameA
GetStringTypeW
GetModuleFileNameA
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
RtlUnwind
InterlockedExchange
GetConsoleMode
GetConsoleCP
SetStdHandle
SetFilePointer
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetLocaleInfoW
RaiseException
LCMapStringW
HeapCreate
IsProcessorFeaturePresent
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
FindFirstFileExA
GetDriveTypeA
CreateThread
ExitThread
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetProcessHeap
MapViewOfFile
UnmapViewOfFile
VirtualQuery
ProcessIdToSessionId
CreateFileMappingW
OpenFileMappingW
GetCurrentProcessId
LoadLibraryW
SetEnvironmentVariableW
GetModuleHandleExW
CopyFileW
lstrlenW
RemoveDirectoryW
GetFileAttributesExW
SetFileAttributesW
GetVolumeInformationW
WideCharToMultiByte
MultiByteToWideChar
SetEvent
ReleaseSemaphore
ResetEvent
CreateSemaphoreW
CreateEventW
DeleteCriticalSection
MoveFileW
SetEndOfFile
SetFilePointerEx
GetFileInformationByHandle
SetThreadPriority
GetCurrentThreadId
ResumeThread
GetTickCount
CreateMutexW
PeekNamedPipe
FormatMessageW
FileTimeToSystemTime
FlushFileBuffers
OpenMutexW
WaitForMultipleObjects
ReleaseMutex
FileTimeToLocalFileTime
QueryPerformanceCounter
QueryPerformanceFrequency
lstrlenA
FindFirstFileExW
GetSystemDirectoryA
lstrcmpiW
GetSystemDefaultLangID
GetWindowsDirectoryW
GetProcessAffinityMask
InterlockedDecrement
DeviceIoControl
GlobalAlloc
GlobalFree
GetDiskFreeSpaceExW
HeapFree
DecodePointer
EncodePointer
HeapAlloc
TranslateMessage
KillTimer
UnregisterClassW
PostQuitMessage
GetMessageW
RegisterClassExW
DestroyWindow
MsgWaitForMultipleObjectsEx
SetWindowLongW
PeekMessageW
GetWindowLongW
CreateWindowExW
DefWindowProcW
DispatchMessageW
EnumDisplayDevicesW
GetSystemMetrics
EnumDisplaySettingsW
SetTimer
EnumDisplaySettingsExW
CryptAcquireContextW
RegSetValueExW
RegEnumKeyExW
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptGenRandom
RegEnumValueW
RegOpenKeyExW
RegCloseKey
SetEntriesInAclW
SetSecurityDescriptorDacl
ConvertStringSidToSidW
InitializeSecurityDescriptor
RegCreateKeyExW
RegisterEventSourceW
DeregisterEventSource
ReportEventW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
SHGetFolderPathW
CommandLineToArgvW
SHFileOperationW
PathCombineW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
SetupDiGetDeviceRegistryPropertyW
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoA
WinHttpSetStatusCallback
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpSetOption
WinHttpOpen
WinHttpOpenRequest
WinHttpCrackUrl
WinHttpReadData
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpReceiveResponse
CoCreateInstance
CoInitialize
CoUninitialize
StringFromGUID2
CoSetProxyBlanket
SysFreeString
SafeArrayGetElement
VariantChangeType
VariantCopy
SafeArrayGetLBound
SysAllocString
VariantInit
VariantClear
SysStringLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ