Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
e86b55b1af50e953464048dfe94c6789_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e86b55b1af50e953464048dfe94c6789_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
e86b55b1af50e953464048dfe94c6789_JaffaCakes118
Size
745KB
MD5
e86b55b1af50e953464048dfe94c6789
SHA1
2ba4b4cf40de5cdb32931e2f11b0222b2bc1754a
SHA256
13f7c8d44d4c7f1a44d1bfe37d085dde4c0089036f3f01c477d3e086d677105a
SHA512
10c5349ecc04e5edcffe6994877768c54f0e059b0217576fa266880ea4cfc6e278dba23e2218e70f5233bdffbf932cc12a5c8a218cd549d7b4ab9f7a15e6b6cf
SSDEEP
12288:Fm77gQ4mKTzOZyewpvXYW1M2NpxcuS7Jab5nX9EU9WTCdP2mjAuz:FmwQ45A17Ub5nNEaFdNJz
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
e:\KINGSOFT_DUBA\Build\Build_Src\kfree\ksafe_released_3.0.0_rb\product\win32\kswebshield.pdb
GetModuleFileNameExW
GetModuleFileNameExA
GetModuleInformation
GetSystemDirectoryW
GetWindowsDirectoryW
Sleep
GetModuleFileNameA
lstrcmpiA
CreateProcessW
CreateProcessA
LoadLibraryExA
LoadLibraryExW
CopyFileExA
CopyFileExW
CopyFileA
CopyFileW
WinExec
OutputDebugStringW
VirtualFree
GetSystemDirectoryA
GetWindowsDirectoryA
GetFullPathNameA
CreateFileA
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
SearchPathW
GetLongPathNameW
GetFileAttributesA
GetExitCodeThread
VirtualQuery
GetTickCount
lstrcpyA
lstrcpynW
LocalFree
GetPrivateProfileStringW
DeleteFileW
GetThreadLocale
OutputDebugStringA
CreateEventA
TerminateThread
lstrcmpiW
HeapCreate
HeapDestroy
HeapAlloc
HeapFree
GetFileInformationByHandle
GetLongPathNameA
WriteFile
OpenMutexW
OpenEventW
OpenFileMappingW
DebugBreak
ReleaseMutex
GetCurrentProcessId
WaitForMultipleObjects
OpenProcess
TerminateProcess
InterlockedCompareExchange
GetProcessHeap
HeapReAlloc
GetCommandLineA
LocalAlloc
GetFileAttributesW
WaitNamedPipeW
IsProcessorFeaturePresent
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStartupInfoA
GetFileType
SetHandleCount
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStdHandle
HeapSize
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
ExitProcess
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
CreateDirectoryA
GetVersionExA
ExitThread
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedExchange
GetVersionExW
IsBadWritePtr
GetPrivateProfileIntW
CreateFileW
ReadFile
SetFilePointer
GetFileSize
VirtualAlloc
CreateThread
GetModuleHandleW
IsBadReadPtr
VirtualProtect
SizeofResource
lstrlenA
SetLastError
LockResource
MultiByteToWideChar
InterlockedDecrement
ResetEvent
InterlockedIncrement
lstrcatW
DeleteCriticalSection
InitializeCriticalSection
CloseHandle
VirtualFreeEx
VirtualAllocEx
VirtualQueryEx
GetSystemInfo
FreeLibrary
LoadLibraryW
WaitForSingleObject
SetEvent
CreateEventW
FindResourceW
GetCurrentThreadId
WideCharToMultiByte
RaiseException
GetLastError
FlushInstructionCache
GetModuleFileNameW
lstrlenW
LeaveCriticalSection
GetProcAddress
LoadLibraryA
FindResourceExW
GetModuleHandleA
EnterCriticalSection
GetCurrentProcess
LoadResource
InflateRect
ReleaseCapture
SetTimer
DefWindowProcW
GetCursorPos
DestroyCursor
DrawFocusRect
DrawEdge
DrawTextW
SetWindowLongW
SystemParametersInfoW
GetSystemMetrics
GetClientRect
UnregisterClassA
KillTimer
UpdateWindow
PostQuitMessage
RegisterHotKey
UnregisterHotKey
SetForegroundWindow
CallWindowProcW
GetCapture
GetMenu
IsWindowEnabled
SetCapture
GetForegroundWindow
GetWindowThreadProcessId
EnableWindow
DestroyWindow
LoadCursorW
SetCursor
SendMessageW
LoadImageW
ShowWindow
PtInRect
IsWindow
GetParent
SetWindowPos
InvalidateRect
GetWindowLongW
BringWindowToTop
BeginPaint
GetWindowRect
EndPaint
ScreenToClient
CreateWindowExW
wsprintfW
wsprintfA
CharNextW
CharLowerW
CharLowerBuffW
ClientToScreen
AdjustWindowRectEx
GetDlgCtrlID
GetWindowTextW
EnumChildWindows
GetClassInfoExW
DispatchMessageW
RegisterClassExW
PeekMessageW
GetMessageW
TranslateMessage
DeleteObject
BitBlt
SelectObject
SetTextColor
SetBkMode
GetObjectW
CreateCompatibleBitmap
TextOutW
DeleteDC
CreateFontW
GetStockObject
CreatePen
SetViewportOrgEx
CreateCompatibleDC
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegQueryValueW
RegOpenKeyW
RegEnumKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
RegQueryValueA
RegSetValueExW
RegDeleteValueW
ord153
ShellExecuteW
SHGetFolderPathW
CommandLineToArgvW
SHGetSpecialFolderPathW
CoGetInterfaceAndReleaseStream
CoInitializeEx
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
CoInitialize
ProgIDFromCLSID
CoTaskMemAlloc
CoTaskMemFree
SysAllocStringLen
SysAllocString
SysStringLen
VariantInit
SysAllocStringByteLen
SafeArrayUnaccessData
VarUI4FromStr
VariantClear
SysFreeString
SafeArrayAccessData
PathFindFileNameA
PathFindExtensionW
PathIsURLW
StrStrA
UrlApplySchemeW
UrlApplySchemeA
PathIsURLA
StrDupW
PathIsRootA
PathIsDirectoryA
StrCmpIW
StrStrIA
PathAppendA
PathRemoveFileSpecA
StrCmpNIA
PathAppendW
PathIsFileSpecW
StrStrIW
PathRemoveFileSpecW
PathFindFileNameW
PathRemoveArgsW
PathUnquoteSpacesW
PathFileExistsW
PathQuoteSpacesW
ImageList_Create
ImageList_Add
ImageList_Destroy
ImageList_GetIconSize
_TrackMouseEvent
ImageList_Draw
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestW
HttpQueryInfoA
InternetConnectA
InternetCloseHandle
InternetSetOptionW
InternetOpenW
InternetCrackUrlA
InternetCrackUrlW
InternetReadFile
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoA
WSASetLastError
GetUWL
IsMatched
MatchingUWUrl
MatchingUrl
ProcessUWUrl
RegisterUrlProcessor
UnregisterUrlProcessor
UrlProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ