Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
14250874a56390ea882ff0de578d2284_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14250874a56390ea882ff0de578d2284_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
14250874a56390ea882ff0de578d2284_JaffaCakes118
Size
178KB
MD5
14250874a56390ea882ff0de578d2284
SHA1
45d479257aa386cc21888c09e79f214d7773301f
SHA256
75bda6b019258e0eafda4d42f2cefca335153bffea21975b36e7ae30ae576b33
SHA512
7ba94a5d40660c4678821e31d5579e15f09c9f1cfb5d45a09e97d467a393bc373c3c05ae4495a9bdc522a81387b797bec14937cfe6a0c61079bc0fd58fb96539
SSDEEP
3072:/9/KVmG58aDFBgvLTncRfamjP9CzZJPT79+LMonFRyDCRu1v:/YV70LT6famz9CnPTBedu1
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
D:\module_code\bin\Release\desk_compositor.pdb
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleCP
FlushFileBuffers
ReadConsoleW
GetConsoleMode
ReadFile
LoadLibraryExW
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
CreateFileMappingW
GetFileType
WriteFile
GetStdHandle
GetProcessHeap
HeapSize
WideCharToMultiByte
GetModuleHandleExW
ExitProcess
GetProcAddress
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
DeleteCriticalSection
DecodePointer
GetLastError
RaiseException
InitializeCriticalSectionAndSpinCount
CreateThread
FreeLibraryAndExitThread
Sleep
GetVersionExW
GetModuleHandleW
LoadLibraryW
GetModuleFileNameW
GetModuleFileNameA
GetCurrentProcessId
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
LCMapStringW
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
CreateFileW
GetLocaleInfoW
SetLastError
GetOEMCP
IsValidCodePage
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
GetACP
EncodePointer
HeapFree
HeapAlloc
GetCommandLineA
GetCurrentThreadId
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
IsProcessorFeaturePresent
UnhookWindowsHookEx
CallNextHookEx
IsWindow
RegisterWindowMessageW
RegisterClassExW
PostThreadMessageW
DefWindowProcW
CreateWindowExW
SetWindowLongPtrW
ShowWindow
GetParent
DestroyWindow
SetWindowsHookExW
GetWindowThreadProcessId
PostMessageW
GetWindow
FindWindowExW
FindWindowW
RedrawWindow
SystemParametersInfoW
FillRect
ReleaseDC
GetDC
SendMessageW
KillTimer
SetTimer
GetSystemMetrics
InvalidateRect
EndPaint
BeginPaint
CallWindowProcW
BitBlt
GetStockObject
SetRectRgn
SelectObject
DeleteObject
CreateRectRgn
CreateCompatibleBitmap
RestoreDC
DeleteDC
CreateCompatibleDC
SaveDC
CreateDIBSection
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreateBitmapFromFile
GdipDisposeImage
GdipDrawImageRectI
GdiplusStartup
GdiplusShutdown
AlphaBlend
GetLoadStatus
SetHook
UnsetHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ