Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
81e5880e49af7cd55cfbea23c7b6af9a_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
81e5880e49af7cd55cfbea23c7b6af9a_JaffaCakes118.dll
Resource
win10v2004-20240426-en
Target
81e5880e49af7cd55cfbea23c7b6af9a_JaffaCakes118
Size
1.3MB
MD5
81e5880e49af7cd55cfbea23c7b6af9a
SHA1
cd893ba3a23d5803e0d2490a4d2f3050f1c2d33c
SHA256
05a1bf86b86890bcff072923b67865c408f33412872a423aedcfeed00bb86c5b
SHA512
b6c490da35686a008090a0a715841a64481220b63a4f01028eb52b6341823ed12b65f36be3ce951c876a7bdb070d25341bb13184e7f0918a839bcb4404b9c189
SSDEEP
24576:ZmjggaRkGv1dwzwO2dlWRDqw5Yc+A4vdzinwg1RrIT:8jggaRkU4d4WRD6dewg12T
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
C:\Injekt - Builds\2.7.41.1\Blasteroids\Source\OSI\Release\amd64\Injektor.pdb
UuidCreate
RpcStringFreeA
UuidToStringA
WideCharToMultiByte
SizeofResource
LockResource
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetCurrentThread
DisableThreadLibraryCalls
LoadLibraryA
GetModuleFileNameA
GetModuleHandleW
Sleep
GetLastError
SetLastError
GetProcAddress
CreateMutexA
CloseHandle
GetCurrentProcessId
CreateThread
CreateFileA
WaitNamedPipeA
WriteFile
GetFileAttributesA
ReadFile
GetCurrentThreadId
OutputDebugStringA
FreeLibrary
InitializeCriticalSectionAndSpinCount
CreateDirectoryA
GetThreadContext
VirtualQuery
GetCurrentProcess
VirtualFree
SetThreadPriority
FlushInstructionCache
VirtualAlloc
VirtualProtectEx
OpenThread
GetSystemInfo
GetThreadPriority
SuspendThread
ResumeThread
GetFullPathNameW
GetFullPathNameA
HeapReAlloc
LoadResource
CreateMutexW
SetFilePointer
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
HeapAlloc
SystemTimeToFileTime
QueryPerformanceCounter
HeapFree
WaitForSingleObject
UnlockFile
LockFile
OutputDebugStringW
GetTickCount
UnlockFileEx
GetProcessHeap
GetSystemTimeAsFileTime
FormatMessageA
LoadLibraryW
FormatMessageW
HeapDestroy
HeapCreate
HeapValidate
GetFileAttributesW
CreateFileW
SetEnvironmentVariableA
FlushFileBuffers
GetTempPathW
HeapSize
LockFileEx
GetDiskFreeSpaceW
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
GetFileAttributesExW
GetVersionExA
DeleteFileW
GetTempPathA
LocalFree
GetSystemTime
AreFileApisANSI
DeleteFileA
GetLocalTime
GetUserDefaultLCID
GetEnvironmentStringsW
FreeEnvironmentStringsW
FindResourceW
FindResourceExW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetFileSize
MultiByteToWideChar
SetStdHandle
GetTimeZoneInformation
GetVersion
HeapSetInformation
RaiseException
EncodePointer
DecodePointer
WriteConsoleW
GetFileType
GetStdHandle
GetModuleFileNameW
FlsSetValue
GetCommandLineA
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
CompareStringW
GetCPInfo
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsFree
FlsAlloc
GetStringTypeW
ExitProcess
GetLocaleInfoW
SetHandleCount
GetStartupInfoW
GetConsoleCP
GetConsoleMode
CallNextHookEx
RegisterWindowMessageA
RegOpenKeyExA
RegCloseKey
WSAGetLastError
WSASetEvent
WSASetLastError
HookProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ