Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
071a5cb5d9413601b84553f7d7dbf9cd_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
071a5cb5d9413601b84553f7d7dbf9cd_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
071a5cb5d9413601b84553f7d7dbf9cd_JaffaCakes118
Size
61KB
MD5
071a5cb5d9413601b84553f7d7dbf9cd
SHA1
78fca0aaccfd3e656d9bef8214936b46d2c9f01b
SHA256
fcd85407caad73a1bdd8b2d95ab78f8a5474d2f662d9255f1c47dede23a5ad75
SHA512
d8119053bab966b846102a1981b4a9ed99e1478a0b19fd0039e944e543aae7ffe67217e73ae92f5c96a7a051ce66e2760f843745f458f47689bb158beeee403d
SSDEEP
768:2nBXbBAirLK4lnwD8R/t2Yhir5Tx5SuJLibch:qZPdwDIV0H5PJ+ch
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
e:\101218_152137_build_naturalice\client_build_naturalice_11.0.329.0\compile\source_sa\bin\release\LaunchHelp.pdb
GetModuleHandleExA
GetVersionExA
GetProcAddress
CloseHandle
GetModuleHandleA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetCurrentProcess
DisableThreadLibraryCalls
GetCurrentThreadId
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WriteFile
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
MultiByteToWideChar
GetLocaleInfoA
FindWindowA
UnhookWindowsHookEx
CallNextHookEx
SendMessageA
RegisterWindowMessageA
SetWindowsHookExA
OpenProcessToken
GetTokenInformation
ShellExecuteExA
GetElevationType
IsElevated
IsVista
IsWow64
MyShellExec
RunElevated
RunNonElevated
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ