Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
068831c186839f859ea494fcd1b33fcf_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
068831c186839f859ea494fcd1b33fcf_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
068831c186839f859ea494fcd1b33fcf_JaffaCakes118
Size
93KB
MD5
068831c186839f859ea494fcd1b33fcf
SHA1
2cdcb6fe0301c636a63ca750803b81ec7a8f1b82
SHA256
1123b0c3c929cc4a0e1bbe7c8ceaadc9529cd7da705e609574c16c5e06eff780
SHA512
84f40529747dccf2cf092c3c4f69d85e11810ab3cb97bc2f3a762366ff135fb9c0e6d193a76c593a7dc699f147577c2994b78175747f845c3425aecebdd49d9d
SSDEEP
1536:oSmOdzdpdEMoELfOr3ab51fEd785VY+pZxlBQme6isKldR8oubKkmfaU2ICEOXT3:fmcdEe7OzabAd785VY+pDlBQmoV8h2xg
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\郭志豪\解决方案\APM\BugFeedBack\Release\BugFeedBack.pdb
dsExitSkin
dsLoadSkin
dsSkinWindow
dsInitKeys
ord969
ord967
ord971
ord2615
ord2635
ord2619
ord2625
ord2623
ord2621
ord2638
ord2633
ord2617
ord2640
ord2628
ord2610
ord2612
ord2630
ord2375
ord2368
ord1641
ord6802
ord4174
ord6804
ord3682
ord5404
ord6376
ord3226
ord1442
ord5625
ord2139
ord1792
ord1791
ord1727
ord5650
ord3140
ord3286
ord4910
ord965
ord595
ord286
ord2694
ord1108
ord4000
ord5008
ord6577
ord6808
ord524
ord744
ord5182
ord811
ord5851
ord2537
ord2364
ord2069
ord4543
ord296
ord3515
ord4682
ord5653
ord4664
ord1492
ord6408
ord3353
ord1675
ord1809
ord1810
ord5324
ord5167
ord4631
ord5632
ord3220
ord285
ord1607
ord960
ord5683
ord5685
ord6466
ord1728
ord4702
ord5154
ord3743
ord5664
ord4603
ord6800
ord5512
ord2074
ord5602
ord4652
ord1493
ord4345
ord1751
ord1754
ord6411
ord3355
ord1665
ord2274
ord374
ord4448
ord4423
ord6801
ord4173
ord6803
ord4747
ord2251
ord2206
ord6035
ord4179
ord1048
ord5548
ord6741
ord5830
ord4213
ord2087
ord3217
ord5674
ord5676
ord4347
ord4996
ord5680
ord5663
ord6018
ord2771
ord2983
ord3112
ord4728
ord2966
ord3115
ord2774
ord2893
ord2764
ord4080
ord4081
ord4071
ord2891
ord4348
ord4905
ord4681
ord3670
ord2447
ord600
ord611
ord639
ord2208
ord6482
ord4211
ord813
ord1220
ord1137
ord794
ord589
ord4043
ord4967
ord1272
ord801
ord3489
_except_handler4_common
_invoke_watson
?terminate@@YAXXZ
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
memset
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
__CxxFrameHandler3
_exit
_cexit
__wgetmainargs
_amsg_exit
_controlfp_s
wcsrchr
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
InterlockedExchange
GetModuleFileNameW
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
Sleep
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
CloseHandle
GetLastError
CreateMutexW
GetPrivateProfileStringW
GetSystemMetrics
GetClientRect
DrawIcon
IsWindow
PostMessageW
IsIconic
SendMessageW
LoadIconW
EnableWindow
SetForegroundWindow
SystemParametersInfoW
ShowWindow
FindWindowW
GetClassInfoW
SHGetSpecialFolderPathW
ShellExecuteExW
ShellExecuteW
InitCommonControlsEx
PathFileExistsW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE