Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
4a2ff62e1cbd4ee98f755dad95b4cd45_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4a2ff62e1cbd4ee98f755dad95b4cd45_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
4a2ff62e1cbd4ee98f755dad95b4cd45_JaffaCakes118
Size
289KB
MD5
4a2ff62e1cbd4ee98f755dad95b4cd45
SHA1
aa7ec3028d01cae228e31c38b020d71503517d57
SHA256
53503972449661e77d63dfd4a9b83adb84f32edd8a3b6169e499aea2e1880ef8
SHA512
67410345af83f32db1585af9755c67e93b9f496ba0c724897135c2dc65efa1cb432814d9d011ca7939d0f26e7d247f072f8bef4ccf07abab187a011b77576dd7
SSDEEP
6144:sKg9SLZVKc0l3H2gE80qrmlAOD+Q4wZ0xNj:sTWZV01WXvQdwZ0xNj
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\TeamCity\workspace\YDOcrProject\dict-pc\src\bin\Release\stable\text_extractor_host.pdb
CreateFileMappingW
MapViewOfFile
QueryDosDeviceW
OpenProcess
GetLogicalDriveStringsW
CloseHandle
MultiByteToWideChar
Sleep
Process32NextW
Process32FirstW
WideCharToMultiByte
UnmapViewOfFile
OpenFileMappingW
CreateToolhelp32Snapshot
CreateFileW
HeapSize
ReadConsoleW
WriteConsoleW
SetEnvironmentVariableW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
GetLastError
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
ReadFile
SetFilePointerEx
GetProcessHeap
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEndOfFile
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
GetProcessImageFileNameW
PathFileExistsW
PathFindFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ