Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a41950dc9f7a77661851af82196128a3_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a41950dc9f7a77661851af82196128a3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
a41950dc9f7a77661851af82196128a3_JaffaCakes118
Size
716KB
MD5
a41950dc9f7a77661851af82196128a3
SHA1
3e66df284092a89c44145681b2c401528ea582b4
SHA256
e124f02358679b20c81b38dda53f544475792d2860a8218fd0adc5a341e35429
SHA512
59417859da41d12af7f2704cff424be860ab7a1a34f5414de5b95f5b8da00e53884d6e98caa966ca526517a4a043ae1c03ab9a61c5643ebb8e5e5a7e28854ce0
SSDEEP
12288:bDVpvvRhXEHwyA2hjUTnFXKC9Zn6sDfRhfz/P0ZiXLrlTUN9PQdB7slW:bDXvPXShjUTn19tRhfzsibh4N9PQdhs0
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\project\sogouime\branch\PinyinDev_R_8_0_OldKernel_Freq\Bin\SogouPdb\SogouInput\crashrpt.pdb
GetFileVersionInfoSizeA
GetFileVersionInfoW
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeW
VerQueryValueW
OutputDebugStringA
SetUnhandledExceptionFilter
OpenMutexA
CreateMutexA
FreeLibrary
MultiByteToWideChar
Sleep
CreateFileA
GetFileSize
ReadFile
GetSystemDirectoryA
GetModuleFileNameA
CreateDirectoryA
CopyFileA
CreateToolhelp32Snapshot
Process32First
OpenProcess
CloseHandle
Process32Next
GetModuleHandleA
SetFilePointer
VirtualQuery
CreateProcessW
GetCurrentProcess
GetModuleHandleW
WriteFile
LoadLibraryW
FormatMessageW
IsBadWritePtr
TerminateProcess
GetModuleFileNameW
CreateFileW
GetLocalTime
lstrcatW
IsDebuggerPresent
GetCurrentThreadId
GetCurrentProcessId
lstrcpyW
GetCommandLineW
GetSystemDirectoryW
GetTempPathW
Process32FirstW
Process32NextW
GetTempFileNameW
SystemTimeToFileTime
MoveFileExW
CreateDirectoryW
WaitForSingleObject
SetFileTime
GlobalAlloc
CopyFileW
GetExitCodeProcess
GetFileAttributesW
FileTimeToSystemTime
GlobalFree
GetProcessId
GetFileTime
DeleteFileW
SetFileAttributesW
SetLastError
FlushFileBuffers
ExitThread
CreateEventW
DuplicateHandle
LocalFree
ReadProcessMemory
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FindFirstFileW
GetLogicalDriveStringsW
FindClose
RemoveDirectoryW
QueryDosDeviceW
FindNextFileW
LocalAlloc
CreateMutexW
OpenMutexW
ReleaseMutex
QueryPerformanceFrequency
GetVersionExW
SetEvent
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
CreateFileMappingW
OpenFileMappingW
TerminateThread
TlsGetValue
InterlockedIncrement
InterlockedDecrement
TlsSetValue
TlsAlloc
TlsFree
lstrlenW
InterlockedExchange
InitializeCriticalSection
RaiseException
RtlUnwind
HeapFree
UnhandledExceptionFilter
HeapAlloc
ExitProcess
GetCommandLineA
GetStartupInfoA
GetTimeZoneInformation
HeapReAlloc
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
GetDriveTypeW
ResumeThread
GetCurrentThread
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
HeapDestroy
VirtualFree
FatalAppExitA
VirtualAlloc
HeapSize
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
SetStdHandle
SetConsoleCtrlHandler
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
SetEndOfFile
GetProcessHeap
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetDriveTypeA
GetFullPathNameA
WideCharToMultiByte
LoadLibraryA
GetProcAddress
GetLastError
CreateThread
InterlockedCompareExchange
RegQueryValueExW
RegOpenKeyW
RegSetValueExW
OpenProcessToken
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
LookupAccountSidW
RegEnumKeyW
RegEnumValueW
RegOpenKeyExW
RegFlushKey
RegEnumKeyExW
AddAccessAllowedAceEx
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
GetNamedSecurityInfoW
InitializeAcl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
SetEntriesInAclW
GetSecurityDescriptorSacl
BuildExplicitAccessWithNameW
GetLengthSid
SetSecurityDescriptorSacl
GetTokenInformation
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ImmDisableIME
GetProcessMemoryInfo
GetModuleInformation
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
HttpEndRequestA
HttpSendRequestA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
PeekMessageW
TranslateMessage
SystemParametersInfoW
GetDesktopWindow
SetWindowPos
MsgWaitForMultipleObjectsEx
SendMessageTimeoutW
FindWindowExW
GetWindowThreadProcessId
MessageBoxW
SetRectEmpty
GetSystemMetrics
wvsprintfW
DispatchMessageW
GetWindowRect
IsIconic
SetForegroundWindow
GetParent
AttachThreadInput
GetForegroundWindow
ShowWindow
GetWindowLongW
ShellExecuteExW
SHFileOperationW
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteW
CoInitialize
CoCreateInstance
CoUninitialize
VariantClear
VariantInit
SysFreeString
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ