Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
01fbeae20892adc72300afb2156d065e_JaffaCakes118.dll
Resource
win7-20240220-en
Target
01fbeae20892adc72300afb2156d065e_JaffaCakes118
Size
133KB
MD5
01fbeae20892adc72300afb2156d065e
SHA1
190d3d50649eb62c7077a67a4e809ea6e3634e83
SHA256
df152416d44e1259b78eae15a21fe0281812bac1ec8d12643e5b9c1896659ce3
SHA512
57644d525ca30fe863fd7ebe31fed9a327eaf6a6c0d09c3ba66be7882e7d33a544e5b9000a6d6269e74392ac848dc19254dcf0516686c97062fb21401beadb34
SSDEEP
1536:jDeJ0Xvonh950winvBv90Le8Kn5rXOkNzn8BBbEuZz8whqjdWtGH:XeJ0/r7903IVXjyBAuZz8whqj8IH
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
F:\Company\Project\Key\bin\WindowsAssist\winasc.pdb
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
GetProcAddress
GetModuleHandleA
lstrlenA
lstrcmpiA
VirtualQuery
GetCurrentProcessId
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
GetModuleFileNameA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
TerminateThread
DisableThreadLibraryCalls
lstrlenW
SetThreadLocale
GetThreadLocale
ExitProcess
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
LocalFree
FlushFileBuffers
CloseHandle
CreateFileW
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
LoadLibraryW
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
GetStartupInfoW
GetFileType
SetHandleCount
GetStringTypeW
LCMapStringW
Sleep
IsDebuggerPresent
HeapSize
HeapReAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
HeapDestroy
HeapCreate
GetModuleFileNameW
GetStdHandle
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
DecodePointer
EncodePointer
RtlUnwind
GetCommandLineA
GetCPInfo
WriteFile
CharNextA
CharNextW
CharLowerA
RegEnumKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
OleRun
CoCreateInstance
CLSIDFromProgID
CoInitialize
StringFromGUID2
CLSIDFromString
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
LoadRegTypeLi
SysStringLen
VarUI4FromStr
VariantClear
SysAllocString
SysAllocStringLen
SysFreeString
GetErrorInfo
WSACleanup
WSAStartup
DllCanUnloadNow
DllGetClassObject
DllInstall
DllInstallHK
DllRegisterServer
DllSendData
DllSetData
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ