Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
f77909a187f93e91fe56f469d0b34574_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f77909a187f93e91fe56f469d0b34574_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f77909a187f93e91fe56f469d0b34574_JaffaCakes118
Size
499KB
MD5
f77909a187f93e91fe56f469d0b34574
SHA1
cf9f0e83a7c88ef0c71b4fc6eb2b2b155159958b
SHA256
11aef8591c52fd2ab31a113a758e51f572c30c0b1f850f00af2e3954b79cc765
SHA512
35e63d64782cdb383d8d517160c0b9dc485ed8d0b3c6de8633df74e9610fbc7acc0d090050c1f083129d2b6c4894d49cde7fc5195614fcb5874e8a215fdc0793
SSDEEP
6144:sxDpQiRFWCTPdpoK/z/H2JRKRLQx0zhUnCwwwrbgL16tQKo7p00wC+TpMfyXZVQh:yqJRAngYc/WspMfkeRJjGTvPIX3Zda0
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
C:\Users\Birion\Desktop\compilation_bot_area\cr-ie-plugin\output\release\crossrider-buttonutil64.pdb
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
InternetConnectA
InternetCloseHandle
InternetReadFile
HttpOpenRequestA
InternetSetOptionA
HttpSendRequestA
FindResourceW
FindResourceExW
WideCharToMultiByte
CreateMutexA
OpenMutexA
CloseHandle
WaitForSingleObject
ReleaseMutex
GetModuleFileNameA
GetLastError
SetFilePointer
WriteFile
SetEndOfFile
FlushFileBuffers
GetFileSize
ReadFile
LoadLibraryA
ExpandEnvironmentStringsA
GetSystemTimeAsFileTime
FindFirstFileA
FindClose
CreateDirectoryA
SetLastError
LocalFree
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateThread
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GlobalFlags
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
lstrcpyA
lstrlenA
CreateEventA
SetEvent
LoadResource
FindFirstChangeNotificationA
WaitForMultipleObjects
DeleteFileA
RemoveDirectoryA
GetCurrentProcess
LocalAlloc
GetVersion
GetVersionExA
GetProcAddress
FreeLibrary
CreateRemoteThread
IsDBCSLeadByte
RaiseException
lstrcmpiA
LoadLibraryExA
GetCurrentThreadId
OutputDebugStringA
WriteProcessMemory
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
MoveFileExW
GetConsoleMode
GetConsoleCP
GetOEMCP
GetACP
IsValidCodePage
GetModuleFileNameW
GetStdHandle
GetModuleHandleExW
ExitProcess
LCMapStringW
CompareStringW
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
LockResource
SizeofResource
GetDiskFreeSpaceA
GetFileType
Sleep
GetModuleHandleA
OpenThread
GetTickCount
PeekNamedPipe
GetTimeZoneInformation
FindNextFileA
CreateFileA
GetMailslotInfo
HeapFree
HeapReAlloc
LoadLibraryExW
OutputDebugStringW
LoadLibraryW
HeapSize
SetFilePointerEx
SetStdHandle
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
GetCPInfo
RtlPcToFileHeader
RtlUnwindEx
RtlLookupFunctionEntry
GetCommandLineA
VirtualQuery
GetProcessHeap
DecodePointer
EncodePointer
GetStringTypeW
IsDebuggerPresent
IsProcessorFeaturePresent
AreFileApisANSI
GetLocalTime
GetSystemInfo
WriteConsoleW
CreateFileW
SetEnvironmentVariableA
ReadConsoleW
HeapAlloc
HeapDestroy
FindResourceA
VirtualProtect
VirtualAlloc
SendMessageA
GetDesktopWindow
GetWindowThreadProcessId
GetForegroundWindow
AttachThreadInput
FindWindowExA
GetParent
FindWindowA
DestroyIcon
GetDC
SetForegroundWindow
GetWindowRect
SetWindowPos
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
InvalidateRect
CharNextA
DestroyWindow
ReleaseDC
SelectObject
CreateFontA
DeleteObject
GetObjectA
GetTextExtentPoint32A
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExA
OpenProcessToken
GetTokenInformation
RegQueryInfoKeyW
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
GetSidSubAuthority
GetSidSubAuthorityCount
RegCloseKey
SHFileOperationA
ShellExecuteExA
CreateStreamOnHGlobal
CoInitializeEx
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
VariantClear
VarUI4FromStr
ImageList_GetImageCount
ImageList_ReplaceIcon
ImageList_Remove
GdipAlloc
GdipDeleteBrush
GdipCloneBrush
GdipCreateSolidFill
GdipDisposeImage
GdipCreatePathGradientFromPath
GdipCreatePen1
GdipDeletePen
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatTrimming
GdipCreatePath
GdipDeletePath
GdipAddPathRectangleI
GdipAddPathEllipseI
GdipWindingModeOutline
GdiplusShutdown
GdiplusStartup
GdipCloneBitmapAreaI
GdipCreateHICONFromBitmap
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDeleteFont
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipDrawImageRectI
GdipMeasureString
GdipDrawString
GdipFillPath
GdipGraphicsClear
GdipDrawPath
GdipSetInterpolationMode
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipSetPathGradientFocusScales
GdipSetPathGradientSurroundColorsWithCount
GdipGetPathGradientPointCount
GdipSetPathGradientCenterColor
GdipFree
DllWrapperOfCreateRemoteThread
DllWrapperOfWriteProcessMemory
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ