Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3145a6e20671c824446b5635bfa2ce49_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3145a6e20671c824446b5635bfa2ce49_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3145a6e20671c824446b5635bfa2ce49_JaffaCakes118
Size
225KB
MD5
3145a6e20671c824446b5635bfa2ce49
SHA1
ecdf7c45226144f9f1d581b922e56ab709274871
SHA256
788c8c2d2effd28292319d799dc4278b5dc04047771d05fe14c45153db34c388
SHA512
a5af0c6566198b223ae2ea585ce8d9003c8d435df920f715adbaf88cc9a08cb95630a9fc1344a5fb957a2caa1862e697ac146cc1498b077ca743f637c23bf650
SSDEEP
3072:FCvCrUIPrz7A0D72Khm7mFrTIKvVjXmYDNUUkwDgKw0iWoAxLOg/0SIp0pb2:Zzz7A0D7wqiKcYDNGzt0iWjOg/0SI82
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\Users\Matthew\WorkCode\PIE\trunk\release\RegCleaner.pdb
Tcl_SetResult
Tcl_GetStringResult
Tcl_SetVar
Tcl_Alloc
Tcl_Eval
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
ord5716
ord1209
ord314
ord744
ord556
ord1084
ord2328
ord1177
ord1175
ord1201
ord1120
ord1167
ord371
ord1098
ord1208
ord1206
ord1092
ord1037
ord6754
ord765
ord315
ord2451
ord300
ord2468
ord2272
ord908
ord577
ord2748
ord2751
ord3931
ord2288
ord2280
ord631
ord386
ord287
ord6138
ord2292
ord6168
ord764
ord6167
ord581
ord2699
ord5715
ord745
ord557
ord865
ord2271
ord4085
ord4108
ord4109
ord3997
ord1482
ord2325
ord5529
ord5563
ord2469
ord3787
ord907
ord911
ord1486
ord4081
ord5403
ord6166
ord1489
ord2322
ord299
ord2475
ord6703
ord5323
ord5089
ord384
ord629
ord1185
ord1191
ord1187
ord1917
ord304
ord266
ord297
ord265
ord762
ord784
ord2131
ord578
ord781
ord310
_CxxThrowException
__clean_type_info_names_internal
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
?terminate@@YAXXZ
_except_handler4_common
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_encoded_null
_malloc_crt
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
__CxxFrameHandler3
fopen_s
fwrite
fclose
fflush
puts
fputs
atoi
strlen
_purecall
strncpy_s
_strdup
isxdigit
_resetstkoflw
_recalloc
_stricmp
_localtime64_s
strftime
_time64
strcpy_s
ldiv
free
malloc
calloc
isdigit
strtol
_strlwr_s
_strnicmp
strncmp
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@ABQBD@Z
_invalid_parameter_noinfo
memmove_s
??0exception@std@@QAE@XZ
memcpy_s
?what@exception@std@@UBEPBDXZ
memset
memcpy
__CppXcptFilter
DeleteCriticalSection
InitializeCriticalSection
GetSystemDirectoryA
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GetWindowsDirectoryA
GetDriveTypeA
QueryDosDeviceA
LoadLibraryA
GetProcAddress
DeleteFileA
CreateDirectoryA
MoveFileA
ExpandEnvironmentStringsA
LeaveCriticalSection
EnterCriticalSection
CloseHandle
GetCurrentProcess
Sleep
GetModuleFileNameA
GetLocalTime
LocalFree
GetVersionExA
TlsAlloc
TlsFree
TlsSetValue
TerminateProcess
RaiseException
FreeLibrary
LocalAlloc
InterlockedCompareExchange
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetACP
GetLocaleInfoA
GetThreadLocale
GetSystemTimeAsFileTime
BeginPaint
PostMessageA
SetPropA
GetDlgCtrlID
GetWindowLongA
DefWindowProcA
GetPropA
RegisterClassExA
EndPaint
SendMessageA
UnregisterClassA
RedrawWindow
InvalidateRect
GetParent
FillRect
GetWindowTextA
GetWindowTextLengthA
GetClientRect
GetSysColor
DrawTextA
GetObjectA
SelectObject
SetTextColor
CreateSolidBrush
SetBkColor
SetBkMode
DeleteObject
GetStockObject
CreateFontIndirectA
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
MakeSelfRelativeSD
GetSecurityDescriptorLength
CopySid
GetSecurityDescriptorControl
OpenProcessToken
RegGetKeySecurity
RegSetKeySecurity
MakeAbsoluteSD
InitializeSecurityDescriptor
LookupPrivilegeValueA
SetSecurityDescriptorOwner
AdjustTokenPrivileges
GetSecurityDescriptorOwner
IsValidSid
GetLengthSid
GetAce
GetAclInformation
AddAce
InitializeAcl
RegCreateKeyA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyA
RegEnumValueA
GetTokenInformation
SHGetSpecialFolderPathA
PathFileExistsA
SHDeleteKeyA
PathIsDirectoryA
CoCreateInstance
?swap@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXAAV12@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV?$_String_const_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
?end@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV?$_String_const_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
PIEDelete
PIEInit
PIENew
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ