Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
7f753f2d36238b7bf187fd2920bdff20_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7f753f2d36238b7bf187fd2920bdff20_JaffaCakes118.dll
Resource
win10v2004-20240426-en
Target
7f753f2d36238b7bf187fd2920bdff20_JaffaCakes118
Size
1.8MB
MD5
7f753f2d36238b7bf187fd2920bdff20
SHA1
d6e6f4a3a82042e86c62bd446fe6526dc137777c
SHA256
2465923bd936bb9bae6e4debc2bb3df72ee91f9296e5d5cfaca96a0e3f82e2a5
SHA512
95be95d721de4a1277992bec2e690f61d20a3918064de544f275d58fa2ae65831a92a52e38508c366866ae16dab365e18af91ebd285899a57b4a6c939f788059
SSDEEP
24576:IU8m4JE+YeYPwfnHBQ/aU6CrFKYCbujgsOAlfTmcjhswFKyL9p:IU8m4YMnHBQ1r/Tuw5LP
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
e:\project\sogouime\branch\PinyinDev_R_8_0_OldKernel_Freq\Bin\SogouPdb\SogouInput\SogouTSF6464.pdb
GetLastError
CloseHandle
GetCurrentProcessId
TlsAlloc
TlsFree
SetFilePointer
WriteFile
GlobalAlloc
FormatMessageW
CreateFileW
ExitThread
SetLastError
GlobalFree
CreateEventW
DuplicateHandle
LocalFree
CreateThread
WideCharToMultiByte
MultiByteToWideChar
FindFirstFileW
MoveFileExW
GetLogicalDriveStringsW
OpenProcess
GetFileAttributesW
FindClose
RemoveDirectoryW
QueryDosDeviceW
FindNextFileW
SetFileAttributesW
CreateProcessW
CreateDirectoryW
WaitForSingleObject
Sleep
CopyFileW
FileTimeToSystemTime
GetTempPathW
DeleteFileW
FindResourceW
LoadResource
SizeofResource
LockResource
GetFileSize
ReadFile
FlushFileBuffers
LocalAlloc
QueryPerformanceCounter
GetVersionExW
CreateMutexW
OpenMutexW
ReleaseMutex
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
SetEvent
GlobalLock
GlobalUnlock
GlobalReAlloc
GetSystemDirectoryW
GetACP
CreateFileA
CreateFileMappingA
OpenFileMappingA
HeapFree
HeapAlloc
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
FlsSetValue
GetCommandLineA
GetTimeZoneInformation
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
ResumeThread
EncodePointer
DecodePointer
FlsGetValue
FlsFree
FlsAlloc
RtlUnwindEx
RaiseException
RtlPcToFileHeader
GetDriveTypeA
FindFirstFileA
GetCPInfo
GetOEMCP
IsValidCodePage
HeapSetInformation
HeapCreate
HeapDestroy
ExitProcess
GetStdHandle
GetModuleFileNameA
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
GetCurrentDirectoryA
GetDateFormatA
GetTimeFormatA
GetFullPathNameA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
LoadLibraryA
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
GetProcessHeap
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetModuleHandleW
GetCurrentProcess
GetCommandLineW
GetWindowsDirectoryA
GetTickCount
GetCurrentThreadId
GetProcAddress
lstrlenW
LoadLibraryW
FreeLibrary
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
TlsSetValue
TlsGetValue
GetModuleFileNameW
GlobalHandle
SetCapture
SetWindowRgn
UpdateLayeredWindow
SetCursor
LoadImageW
SetCursorPos
IntersectRect
SubtractRect
MonitorFromPoint
CallWindowProcW
GetSysColorBrush
InvalidateRect
GetClientRect
ToAscii
IsWindow
TranslateMessage
PeekMessageW
MsgWaitForMultipleObjectsEx
DispatchMessageW
GetWindowRect
GetDesktopWindow
SetWindowPos
ShowWindow
MessageBoxW
OffsetRect
FillRect
GetAsyncKeyState
PostMessageW
SendMessageW
GetKeyState
DrawTextW
LoadCursorW
BeginPaint
InflateRect
ToUnicode
GetKeyboardState
MapVirtualKeyW
GetForegroundWindow
DestroyWindow
SetTimer
UnregisterClassW
KillTimer
GetWindowLongPtrW
SetRectEmpty
RegisterClassExW
GetLastInputInfo
PtInRect
GetDC
SetRect
ReleaseDC
GetCursorPos
CreateWindowExW
SetWindowLongPtrW
DefWindowProcW
EnumThreadWindows
ClientToScreen
GetCaretPos
GetSystemMetrics
SetCaretPos
GetMonitorInfoW
MonitorFromRect
IsRectEmpty
GetFocus
GetParent
FindWindowW
RedrawWindow
GetCursor
ReleaseCapture
MoveWindow
EndPaint
GetClassNameW
IsWindowVisible
SetSecurityInfo
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegOpenKeyW
RegCreateKeyExW
OpenProcessToken
GetTokenInformation
LookupAccountSidW
RegQueryValueExW
RegDeleteKeyW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumValueW
AddAccessAllowedAceEx
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
GetNamedSecurityInfoW
InitializeAcl
SetSecurityDescriptorSacl
GetLengthSid
BuildExplicitAccessWithNameW
GetSecurityDescriptorSacl
SetEntriesInAclW
ConvertStringSecurityDescriptorToSecurityDescriptorW
CoInitialize
CoUninitialize
CoCreateInstance
SysAllocString
SysStringLen
SysFreeString
ImmDisableIME
ImmCreateContext
ImmDestroyContext
ImmUnlockIMCC
ImmLockIMC
ImmLockIMCC
ImmUnlockIMC
ImmCreateIMCC
ImmReSizeIMCC
ImmGetIMCCSize
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
AlphaBlend
TransparentBlt
GradientFill
GetFontData
CreateCompatibleDC
MoveToEx
SelectObject
BitBlt
LineTo
DeleteDC
GetPixel
GetStockObject
SetTextColor
Rectangle
CreatePen
StretchDIBits
GetTextExtentPoint32W
GetCharABCWidthsFloatW
CreateSolidBrush
GetTextMetricsW
CreateFontIndirectW
DeleteObject
ExtCreateRegion
StretchBlt
OffsetRgn
CombineRgn
CreateDIBSection
SetBkMode
SelectClipRgn
CreateCompatibleBitmap
GetFontUnicodeRanges
GetObjectW
CreateRectRgn
GetTextExtentExPointW
SHFileOperationW
SHGetFolderPathW
ShellExecuteW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ