Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
22ae51fff83fe5be0a1e99accab2a136_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
22ae51fff83fe5be0a1e99accab2a136_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
22ae51fff83fe5be0a1e99accab2a136_JaffaCakes118
Size
468KB
MD5
22ae51fff83fe5be0a1e99accab2a136
SHA1
031c869654142e945fc508a1a1e180210782062b
SHA256
b6900f5642ab530090b48a0234d694fd044ac29f1b4b8debda27611fa07c6cbe
SHA512
a82766c877e64f0ca5b79569f1cbd2e1f723e86252fb29fd1662327d8ac69e4803bd833ca6b3ea3621e7fbc1c046e343ae3d6e9201f39080058ddc8066d15796
SSDEEP
6144:R1g2w0xBCVWdZPGQSY3iIdDzwd0fIM+A4JJ6MYBb/9+:fZw+BCVW3cY3ia20fIpxYF+
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
C:\BUILD_AREA\jdk6_02\control\build\windows-i586\tmp\deploy\plugin\jucheck\obj\jucheck.pdb
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
ReleaseDC
InvalidateRect
InvalidateRgn
UnregisterClassA
CharNextA
MapDialogRect
SetWindowContextHelpId
GetWindowRect
PtInRect
SetCursor
GetDlgCtrlID
LoadBitmapA
EnableWindow
EndDialog
RegisterClassA
ShowWindow
PostQuitMessage
CreatePopupMenu
AppendMenuA
GetCursorPos
SetForegroundWindow
TrackPopupMenu
PostMessageA
LoadImageA
DialogBoxIndirectParamA
GetDC
LoadStringA
GetDesktopWindow
wsprintfA
PeekMessageA
DispatchMessageA
DispatchMessageW
TranslateMessage
GetMessageA
GetMessageW
IsWindowUnicode
MsgWaitForMultipleObjects
SetWindowLongA
GetWindowLongA
DefWindowProcA
GetSysColor
ReleaseCapture
CallWindowProcA
EndPaint
BeginPaint
SetFocus
GetWindow
IsChild
GetFocus
DestroyAcceleratorTable
SetCapture
SendMessageA
GetClientRect
MessageBoxA
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
RegisterClassExA
GetClassInfoExA
LoadCursorA
CreateWindowExA
CreateAcceleratorTableA
GetParent
GetClassNameA
SetWindowPos
DestroyWindow
RedrawWindow
GetDlgItem
IsWindow
FillRect
SetTextColor
SetBkMode
SaveDC
SetGraphicsMode
ModifyWorldTransform
SetViewportOrgEx
SetWindowOrgEx
DPtoLP
CreateFontIndirectA
RestoreDC
CreateSolidBrush
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
StretchBlt
ord17
WinVerifyTrust
InternetTimeFromSystemTime
HttpAddRequestHeadersA
InternetErrorDlg
InternetTimeToSystemTime
InternetReadFile
InternetGetConnectedState
InternetOpenA
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
URLDownloadToFileA
Shell_NotifyIconA
ShellExecuteA
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetTimeZoneInformation
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
HeapSize
TerminateProcess
IsBadWritePtr
VirtualFree
HeapCreate
CompareStringW
ExitProcess
GetStartupInfoA
GetSystemTimeAsFileTime
HeapReAlloc
GetEnvironmentStrings
VirtualAlloc
VirtualProtect
RtlUnwind
CreatePipe
SetHandleInformation
ReadFile
GetSystemDirectoryA
GetCurrentProcessId
GetTickCount
SystemTimeToTzSpecificLocalTime
LocalFree
GetEnvironmentVariableA
GetSystemInfo
LoadLibraryA
GetProcAddress
GetSystemTime
CreateEventA
CreateThread
ResetEvent
WaitForMultipleObjects
SetEvent
DeleteFileA
FormatMessageA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
IsBadReadPtr
IsBadCodePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
VirtualQuery
CompareStringA
SetEnvironmentVariableA
HeapDestroy
GetTempPathA
LockResource
GlobalHandle
GlobalFree
SetLastError
GlobalLock
GlobalUnlock
MulDiv
GetCurrentThreadId
CreateProcessA
GetExitCodeProcess
GlobalAlloc
HeapAlloc
GetProcessHeap
HeapFree
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
CreateFileA
GetFileSize
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
GetLastError
CreateMutexA
lstrcmpiA
GetCommandLineA
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetModuleHandleA
MultiByteToWideChar
lstrlenA
GetModuleFileNameA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
lstrcatA
lstrcpyA
lstrcmpA
WriteFile
WaitForSingleObject
SetEndOfFile
SetFilePointer
CompareFileTime
SystemTimeToFileTime
Sleep
FileTimeToSystemTime
GetFileTime
StringFromCLSID
OleUninitialize
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
StringFromGUID2
CoInitializeSecurity
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitialize
CoUninitialize
OleLockRunning
LoadTypeLi
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysStringLen
SysAllocString
SysAllocStringLen
VarUI4FromStr
SysFreeString
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ