Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-17_52aa6bc40b23d02306865b74c79dba85_floxif_mafia.exe
Resource
win7-20240903-en
Target
2024-12-17_52aa6bc40b23d02306865b74c79dba85_floxif_mafia
Size
1.8MB
MD5
52aa6bc40b23d02306865b74c79dba85
SHA1
ccf60156a6495916d08089b2b5bd3b4b062afd98
SHA256
c2b51580a2a4aa055195c8e4629fbdc28674923ca834079866f0f7b41be61243
SHA512
4deedfdc07233c9819e311d2a5af0364646c7957b0ef4d803ae73f5542d37f163639b0877a486547edfca514f884e5c88866dd8238d04655f6c618f729a65091
SSDEEP
49152:W5Zp6SIguuBd5+s5yvDwpPtwHvehhFKT8oBaqBeqyZSERu9WP:W5qSfuuev0pPWehhFMBpBeq0l
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\dvs\p4\build\sw\rel\gpu_drv\r340\r340_00\drivers\NvUpdate\backend\build\bin\Win32\Release\NvBackend.pdb
WSAWaitForMultipleEvents
send
WSAStartup
WSACleanup
gethostbyname
accept
listen
WSACloseEvent
getsockname
setsockopt
__WSAFDIsSet
closesocket
WSACreateEvent
socket
bind
recv
sendto
WSAEventSelect
htons
WSAEnumNetworkEvents
WSAGetLastError
htonl
inet_addr
connect
ioctlsocket
WSAResetEvent
select
GetModuleHandleA
EnterCriticalSection
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
CreatePipe
ReadFile
GetProcessTimes
GetSystemTimeAsFileTime
SetHandleInformation
GetCurrentProcess
GetExitCodeProcess
CreateProcessW
OpenEventW
GetStdHandle
Sleep
WriteFile
WaitForSingleObject
GetCommandLineW
GetUserDefaultUILanguage
GlobalMemoryStatusEx
GetVersionExW
GetNativeSystemInfo
GetProcAddress
GetProcessHeap
HeapFree
HeapAlloc
LocalFree
CloseHandle
SetLastError
GetLastError
CreateFileW
GetSystemDirectoryW
GetModuleHandleW
FreeLibrary
InterlockedCompareExchange
SetEnvironmentVariableA
GetDriveTypeW
SetStdHandle
WriteConsoleW
CompareStringW
InterlockedExchange
HeapReAlloc
GetTimeZoneInformation
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileA
GetFullPathNameA
SetFilePointer
GetConsoleMode
GetConsoleCP
GetStringTypeW
LCMapStringW
GetModuleFileNameA
RtlUnwind
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
ExitProcess
HeapSize
HeapCreate
IsProcessorFeaturePresent
RaiseException
GetLocaleInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
MapViewOfFile
UnmapViewOfFile
VirtualQuery
ProcessIdToSessionId
CreateFileMappingW
OpenFileMappingW
GetCurrentProcessId
LoadLibraryW
IsWow64Process
WideCharToMultiByte
MultiByteToWideChar
SetEvent
ReleaseSemaphore
ResetEvent
CreateSemaphoreW
CreateEventW
DeleteCriticalSection
GetTickCount
lstrlenA
QueryPerformanceCounter
QueryPerformanceFrequency
lstrlenW
CreateMutexW
PeekNamedPipe
SystemTimeToFileTime
FormatMessageW
FileTimeToSystemTime
SetThreadPriority
FlushFileBuffers
OpenMutexW
WaitForMultipleObjects
ReleaseMutex
FileTimeToLocalFileTime
ResumeThread
SetEnvironmentVariableW
GetModuleHandleExW
CreateDirectoryW
GetCurrentThread
CopyFileW
GetFileAttributesW
GetModuleFileNameW
FindClose
GetFileAttributesExW
GetWindowsDirectoryW
DeleteFileW
SetEndOfFile
SetFilePointerEx
GetFileInformationByHandle
GetCurrentThreadId
GetCurrentDirectoryW
GetProcessAffinityMask
SetThreadAffinityMask
InterlockedDecrement
GetSystemDirectoryA
lstrcmpiW
GetSystemDefaultLangID
DeviceIoControl
DecodePointer
EncodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
ExitThread
CreateThread
MoveFileW
GetDriveTypeA
FindFirstFileExA
EnumDisplayDevicesW
EnumDisplaySettingsW
GetSystemMetrics
EnumDisplaySettingsExW
CryptGetHashParam
CryptAcquireContextW
CryptReleaseContext
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
CryptHashData
CryptDestroyHash
CryptCreateHash
RegSetValueExW
RegCreateKeyExW
SetEntriesInAclW
SetSecurityDescriptorDacl
ConvertStringSidToSidW
InitializeSecurityDescriptor
RegQueryValueExW
SHGetFolderPathW
CommandLineToArgvW
PathCombineW
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiSetDeviceInstallParamsW
SetupDiDestroyDriverInfoList
SetupDiEnumDriverInfoW
SetupDiGetDeviceInstallParamsW
SetupDiBuildDriverInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
SetupDiGetDriverInstallParamsW
GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
WinHttpAddRequestHeaders
WinHttpReadData
WinHttpCrackUrl
WinHttpOpen
WinHttpOpenRequest
WinHttpSetOption
WinHttpCloseHandle
WinHttpConnect
WinHttpSendRequest
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpQueryDataAvailable
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoCreateGuid
StringFromGUID2
CoInitialize
SafeArrayGetElement
VariantChangeType
VariantCopy
VariantClear
SysStringLen
SysFreeString
VariantInit
SafeArrayGetLBound
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ