Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
5df7f813b783e4a85c3ab93ec91f944a_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5df7f813b783e4a85c3ab93ec91f944a_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
5df7f813b783e4a85c3ab93ec91f944a_JaffaCakes118
Size
6.5MB
MD5
5df7f813b783e4a85c3ab93ec91f944a
SHA1
21f6742ae2baabbc3fbe544839d8749dddeca520
SHA256
500f920aa9bce37df1bd1e0a6a5cdf5b284ded673664b52585b6d840b53ae4c4
SHA512
4c4fc3e08dcc364856b2279f12db7f99f37de5db9c9b2d2b537df54dc41eb0af60135ac286d32d0cac6683df7854fb285a890447344ada959dfff643c583ac7a
SSDEEP
98304:2HHokX45phDkwopS1gTDjlU4iL0iKjbqTeuZz9rEJBa:7pFrg/BZiauZzBEva
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
F:\trunk\dllplugin\InstallerTool\bin\Win32\Release\pdb\FileInfo.pdb
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
FreeLibrary
MoveFileExW
LoadLibraryW
Sleep
lstrcpynW
GetFileAttributesW
WritePrivateProfileStringW
GetProcAddress
GlobalMemoryStatusEx
SetFileAttributesW
GetModuleFileNameW
GetDriveTypeW
WaitForSingleObject
CloseHandle
lstrlenW
lstrcmpiW
GetShortPathNameW
GetPrivateProfileStringW
GetTickCount
FreeResource
FindResourceW
LoadResource
SizeofResource
LockResource
OpenProcess
TerminateProcess
GetCurrentProcessId
GlobalAlloc
WideCharToMultiByte
MultiByteToWideChar
GlobalFree
lstrcpyW
GetCommandLineW
LocalFree
GetFileSize
SetFilePointer
WriteFile
CreateFileW
CopyFileExW
RemoveDirectoryW
MoveFileWithProgressW
CreateProcessW
GetModuleHandleW
GetExitCodeProcess
WaitForMultipleObjects
GetACP
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
GetVersionExW
GetSystemInfo
SetEndOfFile
SetFileTime
ReadFile
GetFileTime
ResumeThread
GetCurrentProcess
TerminateThread
DeleteFileW
GetExitCodeThread
GetCurrentThreadId
SuspendThread
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetLogicalDriveStringsW
GetDiskFreeSpaceW
GetVolumeInformationW
QueryDosDeviceW
HeapAlloc
HeapFree
GetProcessHeap
FindClose
FindNextFileW
GetFullPathNameW
GetTempFileNameW
CreateDirectoryW
GetSystemDirectoryW
CopyFileW
GetTempPathW
GetCurrentDirectoryW
MoveFileW
GetWindowsDirectoryW
FormatMessageW
SetEvent
ResetEvent
CreateEventW
InterlockedExchangeAdd
InterlockedExchange
SetLastError
FileTimeToSystemTime
GetEnvironmentVariableW
ExpandEnvironmentStringsW
LoadLibraryExW
lstrcatW
GetFileSizeEx
DeviceIoControl
CreateMutexW
ReleaseMutex
ExitProcess
VirtualAlloc
VirtualFree
VirtualQuery
CreateToolhelp32Snapshot
VirtualProtect
FlushInstructionCache
DeleteCriticalSection
DecodePointer
GetLastError
RaiseException
InitializeCriticalSectionAndSpinCount
GetModuleHandleExW
AreFileApisANSI
OpenThread
InterlockedDecrement
Thread32Next
HeapCreate
HeapDestroy
Thread32First
InterlockedCompareExchange
SetThreadContext
GetThreadContext
SetEnvironmentVariableA
FlushFileBuffers
WriteConsoleW
SetStdHandle
HeapReAlloc
GetTimeZoneInformation
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
SetFilePointerEx
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetStdHandle
IsDebuggerPresent
OutputDebugStringW
EncodePointer
GetStringTypeW
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetCommandLineA
CreateThread
ExitThread
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
HeapSize
PostMessageW
wsprintfW
RegisterWindowMessageW
FindWindowW
GetUserNameW
DuplicateTokenEx
AdjustTokenPrivileges
ShellExecuteExW
ord190
SHChangeNotify
ShellExecuteW
ord155
SHGetSpecialFolderPathW
CommandLineToArgvW
SHGetFolderPathW
CoInitialize
CoInitializeEx
CoUninitialize
CoInitializeSecurity
PropVariantClear
CoCreateInstance
VariantChangeType
VariantInit
VariantClear
VarBstrCmp
SysAllocString
SysFreeString
StrStrIW
SHStrDupW
PathAppendW
StrCmpW
PathRemoveFileSpecW
StrCatW
WTSQuerySessionInformationW
WTSFreeMemory
CheckCrcAndGetValue
CheckFiles
CheckInstallTime
CheckSystemConfiguration
CleanAnimateMark
ClearAudioReg
CopyImportantFileWithTransaction
CreateDownloadFolder
CreateLowIntegrityProcess
CreateScheduledTask
Delete2345ExplorerTargetShortCut
DeleteInstallFile
DeleteScheduledTask
EncodeJifenID
EncodeRecommendPcsafeUnionCustom
EncodeUnion
FindProc
FindProc2345Explorer
FindSubstring
FixSoftware
FixSoftwareAfterRecommendPCSafe
Get2345ExplorerPath
GetCreateDesktopGuideCloudConfig
GetCurrentSystemTime
GetFixSoftwareCloudConfig
GetInstallSafecenterCloudConfig
GetJifenInstallerParams
GetParentProcessName
GetRandomPromotionDllPath
GetRecommendPCSafeCloudConfig
GetSDKCloudConfig
GetUnionCustomInstallerParams
GetUnionNameInstallerParams
GetValueWithCrcCode
ImpersonateUser
Init
InitInstallStatusStatistic
InitStatService
InitializeRecommendPCSafe
Install2345MgrDLL
InstallPCSafe
InstallRecommendPCSafeDll
InstallShield
IsWin10OrLater
KillProc
KillProc2345Explorer
KillProcessByPathAndName
MergeMaskString
NetFirewallAddRule
NetFirewallDeleteRule
PinToStartMenu
PinToTaskBar
PreProcessShortCut
RevertUser
SendInstallFeatureStat
SendOverwriteFeatureStat
SendStatInfo
SendUninstallFeatureStat
SendUpgradeFeatureStat
SetInstallStep
SetUserOperation
ShieldUnlock
StartCloudConfigRequest
StopShield
TerminateCloudConfigRequest
UnInstallSafeCenter
UninitInstallStatusStatistic
UninitStatService
UninitializeRecommendPCSafe
Uninstall2345MgrDLL
UninstallShield
UnpinFromStartMenu
UnpinFromTaskBar
WriteInstallData
WriteLog
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ