Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
47bb3320ec1ec8317f2b72777801c95b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
47bb3320ec1ec8317f2b72777801c95b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
47bb3320ec1ec8317f2b72777801c95b_JaffaCakes118
Size
600KB
MD5
47bb3320ec1ec8317f2b72777801c95b
SHA1
bfcb767c926f04f313627b6865e87bce54a475fc
SHA256
707133aad7c6e5c81c10235a93ede99b37ef86fb0d8c9ffded455cc69298e1c2
SHA512
df9a1a070d625d43d4aa0b17e795c933d74c6cd7f71a7e6192ebc5681557cc7d312512a899ccf870a6defeaacf308707ce056efb7e5869966b93561cf79c6407
SSDEEP
3072:dXwZyUcBCyRd/rmD8N5jZ5FlZtVQ292BoZ5jcWmOmt5TEINopa:dXwUkGdtRlZOg5O4mqa
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
F:\작업\퍼스트클릭\FirstClick(ch9)\Release\FirstClickUninstaller.pdb
GetAdaptersInfo
FindResourceExA
WideCharToMultiByte
GetTempPathA
CreateDirectoryA
GetSystemTime
FindFirstFileA
FindNextFileA
FindClose
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
InterlockedIncrement
InterlockedDecrement
FindResourceA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetLocaleInfoA
LoadResource
LockResource
SizeofResource
CloseHandle
CreateThread
GetExitCodeProcess
Sleep
CopyFileA
GetModuleFileNameA
GetWindowsDirectoryA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetModuleHandleA
VirtualAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
MultiByteToWideChar
lstrlenA
GetCommandLineA
GetStartupInfoA
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
TranslateMessage
GetMessageA
LoadStringA
EndPaint
DrawTextA
DispatchMessageA
LoadBitmapA
PostQuitMessage
GetDlgItem
SendMessageA
InvalidateRect
UpdateWindow
ShowWindow
GetSystemMetrics
MoveWindow
GetWindowRect
LoadIconA
SetClassLongA
CreateDialogParamA
SetRect
BeginPaint
CreateCompatibleDC
SetBkMode
DeleteDC
BitBlt
SelectObject
CreateFontA
RegOpenKeyA
RegDeleteKeyA
RegDeleteValueA
ShellExecuteExA
OleRun
CoCreateInstance
CoInitialize
SysAllocString
SysFreeString
SysStringByteLen
SysAllocStringByteLen
VariantClear
GetErrorInfo
PathFileExistsA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ