Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2f2b111ce91b402c148a77fc9a396232_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f2b111ce91b402c148a77fc9a396232_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2f2b111ce91b402c148a77fc9a396232_JaffaCakes118
Size
93KB
MD5
2f2b111ce91b402c148a77fc9a396232
SHA1
c0e101643ac741a6aaaafecf5e84a303d88e4209
SHA256
5ab33052f23b08c92bbec4631bd7148990c4f568a55a1eeedcd89b4bcf80db1c
SHA512
23d3c42f106b083a361cd30d7e28d75fe2862f7882ea7ec2fc9c73734253f527bad68860500780e02f9f1153101f69a4268ff29df7ac4bf745e2f39172dfb139
SSDEEP
1536:x+fdFc0O3ZwVtwqxRWSvnODJtA7i+4ro+Jntm5q2m8:cFc0wZijU075+V85qI
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\Documents and Settings\Himanshu\Desktop\SpyClean\_bin\Release\RegistryChecker.pdb
?GetManager@BackupManager@@YAAAUIManager@1@XZ
?GetLogger@Logger@@YAAAUILogger@1@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?_Nomemory@std@@YAXXZ
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
ExitProcess
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetFileAttributesA
ExpandEnvironmentStringsA
Sleep
GetLogicalDrives
GetDriveTypeA
FindFirstFileA
FindNextFileA
FindClose
CloseHandle
CreateEventA
WaitForSingleObject
SetEvent
lstrlenA
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
ResetEvent
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
RegCloseKey
CoInitialize
CoCreateInstance
SysAllocStringLen
SysFreeString
PathFileExistsA
__CppXcptFilter
?terminate@@YAXXZ
_adjust_fdiv
_initterm
_onexit
__dllonexit
??1type_info@@UAE@XZ
__security_error_handler
memset
_callnewh
atoi
_mbsnbicmp
_except_handler3
free
malloc
memmove
_CxxThrowException
??0exception@@QAE@ABV0@@Z
??3@YAXPAX@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_purecall
__CxxFrameHandler
_strnicmp
_stricmp
ord1024
ord2322
ord297
ord1489
ord876
ord2902
ord299
ord2933
ord1482
ord304
ord1486
ord865
ord3934
ord2272
ord1916
ord5529
ord310
ord4109
ord911
ord298
ord784
ord4081
ord6167
ord907
ord6179
ord6138
ord2699
ord2271
ord6168
ord5491
ord305
ord6118
ord781
ord578
?GetChecker@RegistryChecker@@YAAAUIChecker@1@XZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ