Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-24_3516447d997965c415dcf816c294ae00_floxif_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-24_3516447d997965c415dcf816c294ae00_floxif_mafia.exe
Resource
win10v2004-20241007-en
Target
2024-12-24_3516447d997965c415dcf816c294ae00_floxif_mafia
Size
724KB
MD5
3516447d997965c415dcf816c294ae00
SHA1
fa69afb1aff26b48723d11b0655f32f6223e9864
SHA256
bd95f6a965da5964afe031ced376031f7266e2e4def52ce3e3aa509c34abe01a
SHA512
a009737674f12a77424b9256f309fbb93fdc6b59a6be1cee4f9c584d604ee17ebafed91c7ddf031fd03acd69b6bcbe36cb42e86be46f3e744d794a430098ba13
SSDEEP
12288:UJRgXhW8KMAZ4G/LsR0JfAmU2IeAYAIfX4Hhd9BM4ACyyWLrPEV1RRO+fDcVXm3e:gYEpDZ4G4R2fAmU2IeAYAIfX4Hhd9BM5
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\DNF\source\Launcher\Trunk\NeopleCustomURLStarter\Real_Release\NeopleCustomURLStarter.pdb
HttpQueryInfoA
InternetQueryDataAvailable
InternetOpenA
InternetSetOptionA
InternetAttemptConnect
InternetConnectA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
GetStringTypeW
IsValidLocale
GetModuleHandleA
FindResourceA
GetLastError
SizeofResource
LoadResource
LockResource
WideCharToMultiByte
IsDBCSLeadByte
FreeResource
MultiByteToWideChar
DeleteFileA
Sleep
GetTickCount
CreateFileA
WriteFile
CloseHandle
GetModuleFileNameA
SetCurrentDirectoryA
FreeLibrary
lstrlenA
GetProcAddress
lstrcmpiA
lstrlenW
RaiseException
LoadLibraryExA
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
CreateMutexA
GetCurrentProcess
TerminateProcess
GetFileAttributesA
GetWindowsDirectoryA
FindClose
WaitForSingleObject
CreateProcessA
LocalFree
GetFileSize
ReadFile
LocalAlloc
FreeEnvironmentStringsW
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
InitializeCriticalSection
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
HeapReAlloc
GetModuleFileNameW
FlushFileBuffers
SetFilePointer
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
ExitProcess
HeapSize
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetStdHandle
LoadLibraryW
CompareStringW
WriteConsoleW
SetEndOfFile
GetProcessHeap
GetTimeZoneInformation
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapCreate
IsProcessorFeaturePresent
GetCPInfo
LCMapStringW
SetEnvironmentVariableA
FindFirstFileExA
FileTimeToLocalFileTime
FileTimeToSystemTime
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineA
CreateFileW
InterlockedExchange
EncodePointer
DecodePointer
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RemoveDirectoryA
HeapAlloc
VirtualProtect
VirtualAlloc
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetDlgItem
ShowWindow
UpdateWindow
GetWindowLongA
SetDlgItemTextA
SendMessageA
CreateDialogParamA
DestroyWindow
PeekMessageA
CharNextA
DispatchMessageA
TranslateMessage
SetWindowLongA
MessageBoxA
PostQuitMessage
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetSpecialFolderPathA
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
VariantClear
VariantInit
VarUI4FromStr
StrStrIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ