Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-04_0957040449fd45eb0cb04ad0abd55f49_floxif_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-04_0957040449fd45eb0cb04ad0abd55f49_floxif_mafia.exe
Resource
win10v2004-20241007-en
Target
2025-01-04_0957040449fd45eb0cb04ad0abd55f49_floxif_mafia
Size
306KB
MD5
0957040449fd45eb0cb04ad0abd55f49
SHA1
62879dff8068ffda52c59164ad24f7c1e37a4347
SHA256
b836c8a0d5def0198309bad4e54bda6e4f0004137e0176236c123b49aea09671
SHA512
775c280b2eef5096f116c06a664e8104856781e6e6141697aa163fa17b3c327c5f3a4085fe376bc2cdd3564475431c1d7381c6b429c59611b051fbf4f6b9ab3b
SSDEEP
6144:02MNLF0O+gSqWxrAbX1yqNNAQHSYvBV+UdvrEFp7hK1w/GI:0/H0OSqWxsbXgSiYvBjvrEH7kw/GI
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\HUDSON\workspace\Autoupdate2.1-update\obj\jaureg\Release\jaureg.pdb
SetDllDirectoryA
SetLastError
CreateProcessA
CreateDirectoryA
GetCommandLineA
lstrcmpA
LocalFree
CreateMutexA
WaitForSingleObject
GetExitCodeProcess
GlobalAlloc
InitializeCriticalSection
IsValidLocale
GetLastError
GetSystemDirectoryA
CloseHandle
lstrlenA
WriteFile
SetFilePointer
CreateFileA
lstrcatA
GetTempPathA
lstrcmpiA
GetEnvironmentVariableA
EnumSystemLocalesA
GetLocaleInfoA
GetSystemTimeAsFileTime
HeapFree
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
EnterCriticalSection
LeaveCriticalSection
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
HeapAlloc
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
WideCharToMultiByte
GetTimeZoneInformation
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
IsProcessorFeaturePresent
RaiseException
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
GetModuleFileNameW
GetConsoleCP
GetConsoleMode
ReadFile
FlushFileBuffers
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
HeapReAlloc
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
MultiByteToWideChar
WriteConsoleW
SetStdHandle
GetDriveTypeW
SetEndOfFile
GetProcessHeap
LCMapStringW
GetStringTypeW
CreateFileW
CompareStringW
SetEnvironmentVariableA
GetUserDefaultLCID
wsprintfA
RegDeleteValueA
RegCloseKey
RegEnumKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegSetValueExA
SHGetFolderPathA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ