Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
95a2fc3474a2d9ebbb34445c0436a73c_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
95a2fc3474a2d9ebbb34445c0436a73c_JaffaCakes118.dll
Resource
win10v2004-20240426-en
Target
95a2fc3474a2d9ebbb34445c0436a73c_JaffaCakes118
Size
85KB
MD5
95a2fc3474a2d9ebbb34445c0436a73c
SHA1
817657d2c6cf92dc73525de27a9e15f6db3435cb
SHA256
f22b01eb441699f871fd9afa248ffcba93d8ce24d52a7b538a3c190e17ad0a67
SHA512
392dcc51cf04cde2d50ca0ef20b1a75f3e47a45deb4a20fd333de894a7c17fd16500e24522863703143ee4f1d4e9224a286052eabde9afd3d3e545abe92b35af
SSDEEP
1536:7pg8AuPmrGRBn82dDtP4a75XlostmTPpfMNrnrSD/BcLfH/AFXN:68RRBnzdDtP4wsstkqbIeIT
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_onexit
__dllonexit
_adjust_fdiv
malloc
_initterm
free
?terminate@@YAXXZ
_ftol
_except_handler3
sprintf
strstr
memmove
__CxxFrameHandler
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
_splitpath
DisableThreadLibraryCalls
GetCurrentThread
GetThreadPriority
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemInfo
GetCurrentProcess
GetProcessAffinityMask
SetProcessAffinityMask
Sleep
VirtualFree
VirtualAlloc
GetProcAddress
LoadLibraryA
GetModuleFileNameA
FreeLibrary
wsprintfA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
??0CPL2XAPI@@QAE@ABV0@@Z
??0CPL2XAPI@@QAE@XZ
??0CPL2XDLL@@QAE@ABV0@@Z
??0CPL2XDLL@@QAE@XZ
??1CPL2XAPI@@UAE@XZ
??1CPL2XDLL@@UAE@XZ
??4CPL2XAPI@@QAEAAV0@ABV0@@Z
??_7CPL2XAPI@@6B@
??_7CPL2XDLL@@6B@
?DSPexp@CPL2XDLL@@QAENN@Z
?DSPlog@CPL2XDLL@@QAENN@Z
?DSPrnd2@CPL2XDLL@@QAENHHN@Z
?PL2X_Close@CPL2XDLL@@UAEJXZ
?PL2X_GetCurSettings@CPL2XDLL@@UAEJPAUtagPL2SETTINGS@@@Z
?PL2X_GetMode@CPL2XDLL@@UAEJKPAK@Z
?PL2X_Init@CPL2XDLL@@UAEJXZ
?PL2X_Open@CPL2XDLL@@UAEJPAUtagPL2SETTINGS@@@Z
?PL2X_Process@CPL2XDLL@@UAEJPAPAX0K@Z
?PL2X_Process_Kernel@CPL2XDLL@@QAEJPAPAX0K@Z
?PL2X_Reset@CPL2XDLL@@UAEJXZ
?PL2X_SetCurSettings@CPL2XDLL@@UAEJPAUtagPL2SETTINGS@@@Z
?PL2X_SetMode@CPL2XDLL@@UAEJKK@Z
?biquad@CPL2XDLL@@QAEXPANF0FPAUBIQUAD_CFS@@PAUBIQUAD_VARS@@F@Z
?dolby_sub@CPL2XDLL@@QAE?AUdolby_sip@@U2@@Z
?polezero@CPL2XDLL@@QAEXPANF0FPAUPOLEZERO_CFS@@PAUPOLEZERO_VARS@@F@Z
?prol_ii_init@CPL2XDLL@@QAEXPAUpro_logic_ii_pl@@@Z
?prol_ii_main@CPL2XDLL@@QAEXXZ
?prol_ii_side@CPL2XDLL@@QAEXXZ
?prologic_ii@CPL2XDLL@@QAE?AUdolby_sip@@U2@@Z
GetPL2XDLL
TEST
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ