Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
3665449cc4aab55aef2904e69f5df371_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3665449cc4aab55aef2904e69f5df371_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
3665449cc4aab55aef2904e69f5df371_JaffaCakes118
Size
579KB
MD5
3665449cc4aab55aef2904e69f5df371
SHA1
b96ddd1e196f66e7c6c263da2ec1f888b555a4ce
SHA256
2303fcba85210755e560e027e3a9c958f2dbd62a1fb2112d2f4d642237221134
SHA512
011f76db17ab2fa2953c32683fc880382f8bc72c1c0dc2da92efa16eedf341f6fa12135871a957e1d0a2069f8dd3a8adffca79adafc28375cb344d88129bc0ea
SSDEEP
12288:dSZDU5qQkyP+EWkH9L2JnT8DMhHTOpR6iWyrj:dSZsRkop/HR2JISHTOLtWi
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\jenkins_Trunk\workspace\CEN_BlueRay_BD_Gongfang\qqpcmgr_proj\Basic\Output\BinFinal\QPerfHelp.pdb
htonl
htons
VirtualQuery
FreeLibrary
LoadLibraryA
WideCharToMultiByte
SetFilePointer
ExpandEnvironmentStringsW
GetSystemInfo
LoadLibraryW
OpenProcess
lstrcmpiW
SwitchToThread
InterlockedExchange
GetVersionExW
InterlockedCompareExchange
InterlockedIncrement
DeleteCriticalSection
lstrlenW
InitializeCriticalSection
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
Sleep
ReadFile
GetFileSize
CreateFileA
GetSystemDirectoryA
Process32NextW
GetCurrentProcess
Process32FirstW
WriteFile
GetProcAddress
CreateToolhelp32Snapshot
CreateFileW
GetModuleHandleW
CloseHandle
LockResource
LoadResource
SizeofResource
FindResourceW
GetModuleFileNameW
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
GetLastError
GetSystemDefaultLangID
GetCurrentProcessId
GetSystemTimeAsFileTime
MapViewOfFile
UnmapViewOfFile
SetEvent
OpenFileMappingW
OpenEventW
SetLastError
GetLocalTime
RegEnumValueW
RegEnumKeyExW
RegFlushKey
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegSetKeySecurity
RegGetKeySecurity
RegCreateKeyExW
RegNotifyChangeKeyValue
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
OpenProcessToken
CloseServiceHandle
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
LookupPrivilegeNameW
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueW
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
StrStrIW
ImmDisableIME
GetProcessMemoryInfo
GetModuleBaseNameW
EnumProcessModules
GetModuleFileNameExW
EnumProcesses
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@G@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z
??_D?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?str@?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?data@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEPB_WXZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
?clear@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEXXZ
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
?c_str@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEPB_WXZ
??0?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@H@Z
?setw@std@@YA?AU?$_Smanip@H@1@H@Z
??1exception@std@@UAE@XZ
_wcsicmp
??3@YAXPAX@Z
??_V@YAXPAX@Z
malloc
memcpy_s
memmove_s
?what@exception@std@@UBEPBDXZ
_snprintf_s
wcsncpy_s
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
wcscpy_s
_wtoi64
_purecall
wcsrchr
_wsplitpath_s
swscanf_s
_vsnprintf_s
_vsnwprintf_s
??0exception@std@@QAE@ABQBD@Z
_CxxThrowException
__CxxFrameHandler3
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_except_handler4_common
_invoke_watson
_controlfp_s
??0exception@std@@QAE@ABV01@@Z
free
??2@YAPAXI@Z
memcpy
_memicmp
wcsncat_s
strchr
fclose
strncpy_s
fflush
fwrite
strrchr
memset
_except_handler3
SendMessageTimeoutW
IsWindow
FindWindowA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE