Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
480476328700abd9e44f998264cb5353_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
480476328700abd9e44f998264cb5353_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
480476328700abd9e44f998264cb5353_JaffaCakes118
Size
102KB
MD5
480476328700abd9e44f998264cb5353
SHA1
a97821b661ca91e4bf86a6126776d82400b1698a
SHA256
bafa31e7029410de38a5e7bcada4f3ef7f819b6b03118b36e43b85b9f5860605
SHA512
de4bde7f4c0d86a7c25328a871a157730fb4a582906674904e7396ad50e82af665bbcddc49072bd490962f7028a629a35c918451b9afde8fe2afb596e31eb56e
SSDEEP
1536:lJJ0/bgBgvTh26QshXaE0QI7qQ5OGx4CaxGisKldLf8CzuAtW/QjPfihC:3sb7d26QshXBMTOGUxLXf8UtsQjPfic
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
f:\dev\work\orionGA\2014_20110822_0025\Yahoo\YPager\output\dist\bin\Release\ymsgr_tray.pdb
?GetLayoutEngine@yui@@YAPAVILayoutEngine@1@XZ
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
MultiByteToWideChar
lstrlenA
GetPrivateProfileStringW
GetModuleFileNameW
lstrcpynW
WideCharToMultiByte
lstrlenW
GetVersionExW
RaiseException
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
SetLastError
InitializeCriticalSection
DeleteCriticalSection
GetTimeFormatW
GlobalAddAtomW
GlobalDeleteAtom
ReleaseMutex
InterlockedIncrement
FindResourceExW
lstrcmpiW
CloseHandle
FreeLibrary
LoadLibraryExW
GetModuleHandleW
LoadLibraryW
WaitForSingleObject
GetCommandLineW
CreateMutexW
WinExec
GetStartupInfoA
Sleep
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcAddress
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
FindResourceW
LoadResource
LockResource
SizeofResource
GetLastError
GetSystemTimeAsFileTime
InterlockedDecrement
UnhandledExceptionFilter
TerminateProcess
EndDialog
SetFocus
RegisterClassW
DefWindowProcW
BeginPaint
LoadCursorW
DestroyWindow
IsWindow
CreateDialogParamW
DialogBoxParamW
GetActiveWindow
SetForegroundWindow
MoveWindow
UnregisterClassA
GetCursorPos
GetMessageW
TranslateMessage
GetClientRect
CreateWindowExW
LoadImageW
RegisterClassExW
CallWindowProcW
SetMenuDefaultItem
TrackPopupMenu
DestroyMenu
PostQuitMessage
GetClassInfoExW
PostMessageW
UnregisterHotKey
RegisterHotKey
ScreenToClient
RedrawWindow
SetTimer
KillTimer
LoadMenuW
GetMenuItemCount
GetMenuStringW
GetSubMenu
LoadStringW
GetSysColor
IsDialogMessageW
FillRect
DrawTextW
EndPaint
CharNextW
SetMenuItemInfoW
GetDesktopWindow
GetWindowLongW
GetWindowRect
GetDC
ReleaseDC
SetWindowPos
SetWindowTextW
EnableWindow
ShowWindow
GetDlgItem
GetParent
SendDlgItemMessageW
SendMessageW
SetWindowLongW
DispatchMessageW
RegisterWindowMessageW
GetDeviceCaps
CreateSolidBrush
SetBkColor
SelectObject
SetBkMode
SetTextColor
DeleteObject
Shell_NotifyIconW
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
VarUI4FromStr
PathRemoveFileSpecW
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?c_str@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEPB_WXZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
?terminate@@YAXXZ
wcsncpy_s
malloc
swprintf_s
srand
rand
_initterm_e
wcscpy_s
_wcsicmp
wcsncat
_wtoi
vswprintf_s
_vscwprintf
memset
??_V@YAXPAX@Z
wcsrchr
wcsstr
__CxxFrameHandler3
_recalloc
calloc
free
memmove_s
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_CxxThrowException
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_invoke_watson
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy_s
_controlfp_s
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE