Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-05_3c01a7e1a34cc4c11a1058e3a0391165_floxif_mafia.exe
Resource
win7-20241023-en
Target
2025-02-05_3c01a7e1a34cc4c11a1058e3a0391165_floxif_mafia
Size
512KB
MD5
3c01a7e1a34cc4c11a1058e3a0391165
SHA1
f2f53fb6b332e8fcdafa70d456ce02c930380320
SHA256
540cda54efd9a55d6870b0ea52d7149a8ffa27658f2572a925c0605bd43bb7a8
SHA512
45564d2425a41b3f38d7ab47fbb805e14321bebe742710f9ad6f5ae55a00e5d28b673943c7b9d0cc8b26f1aff5c868000f3171c9706b6ebba70f9bbce6c5fcb7
SSDEEP
12288:HKqMmoNiZiJrAkFjcZE6nPMz5S5VnDwvFNFSXGhK1VqejEdkGE2azATABjvrEH7n:HKqMmodGZE6nP45eVS2GhK1VqeIApATZ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\updater3.0\build-rel\build\releases\build\updaterstartuputility\vc10\outdir-Release\updaterstartuputility.pdb
CoInitializeEx
CoTaskMemFree
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
FreeSid
OpenProcessToken
GetTokenInformation
EqualSid
AllocateAndInitializeSid
CheckTokenMembership
SetNamedSecurityInfoW
NetApiBufferFree
NetWkstaUserGetInfo
SetEndOfFile
GetProcessHeap
CompareStringW
HeapFree
SetStdHandle
WriteConsoleW
GetCurrentProcess
CloseHandle
InterlockedDecrement
TerminateThread
WaitForSingleObject
GetLocalTime
GetExitCodeThread
CreateThread
MultiByteToWideChar
LocalFree
GetCommandLineW
CreateProcessW
GetLastError
SetEnvironmentVariableA
FreeLibrary
GetProcAddress
LoadLibraryW
GetVersionExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteFileW
CreateFileW
CopyFileW
FileTimeToLocalFileTime
GetFileTime
SetFileAttributesW
CreateDirectoryW
WideCharToMultiByte
GetACP
CreateEventA
SetEvent
GetLongPathNameW
GetTempPathW
ReleaseMutex
InterlockedIncrement
CreateMutexA
InterlockedExchange
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapSetInformation
GetStartupInfoW
IsValidLocale
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
RtlUnwind
RaiseException
GetCPInfo
LCMapStringW
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetOEMCP
IsValidCodePage
GetLocaleInfoW
GetTimeZoneInformation
HeapSize
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
SHGetPathFromIDListW
SHGetMalloc
CommandLineToArgvW
SHGetSpecialFolderLocation
SysFreeString
VariantInit
VariantClear
SysAllocString
PathIsFileSpecW
SHGetValueW
PathFileExistsW
PathRemoveFileSpecW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ