Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
5ce9b5bedb63fff9df8172406d335a0a_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ce9b5bedb63fff9df8172406d335a0a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5ce9b5bedb63fff9df8172406d335a0a_JaffaCakes118
Size
685KB
MD5
5ce9b5bedb63fff9df8172406d335a0a
SHA1
ca62d0021610c119f6eb02bec309701e1e5f3116
SHA256
faceaf2749a463c738d73fd30538d9ced5ac6eb0894ed6463f2a8c3730fb001c
SHA512
2837bf3144a123509fc66238c03e6e2c0801820a2b8fc10cfbf2c36cb707ce2d4c98f06514998ec4d04444a2c1bd8874940845c09ee2414c9c55cf09e5625397
SSDEEP
12288:vYvtyKb/LiRGYDaa3NRIBycRL2bFddUVrKsMJna/UIW:wvvbrYDoycN2bFdWVrKsgn/
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\Users\Matthew\WorkCode\SpyFrame\trunk\release\SpyCleaner.pdb
UuidCreate
Tcl_EvalEx
Tcl_CreateCommand
Tcl_SetResult
Tcl_SplitList
Tcl_GetStringResult
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
LocalAlloc
TlsAlloc
TlsFree
FlushFileBuffers
VirtualAlloc
VirtualFree
GetModuleFileNameA
GetVersionExA
GetOverlappedResult
WritePrivateProfileStringA
GetModuleHandleA
GetWindowsDirectoryA
TerminateProcess
CreateNamedPipeA
CopyFileA
GetFileTime
FileTimeToSystemTime
GetSystemInfo
RaiseException
GetStdHandle
GetLocalTime
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
GetThreadLocale
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetCurrentThreadId
WaitForSingleObject
GlobalGetAtomNameA
FileTimeToLocalFileTime
GetModuleFileNameW
InterlockedDecrement
GlobalReAlloc
GlobalHandle
LocalReAlloc
SetLastError
InterlockedIncrement
lstrcmpA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualQuery
HeapReAlloc
GetCommandLineA
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
ExitProcess
RtlUnwind
HeapSize
GetACP
IsValidCodePage
SetHandleCount
GetStartupInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
SetFilePointer
WriteFile
ReadFile
TlsSetValue
SleepEx
TlsGetValue
ConnectNamedPipe
GetProcessHeap
FindClose
FindNextFileA
GetFileAttributesA
FindFirstFileA
GetBinaryTypeA
CreateDirectoryA
QueryDosDeviceA
GetFileSize
OpenProcess
CreateFileA
GetCurrentProcessId
MoveFileExA
SetFileAttributesA
lstrlenA
DeleteCriticalSection
GetCurrentProcess
GetVersion
InterlockedExchange
CompareStringW
CompareStringA
MoveFileA
CreateIoCompletionPort
GetDriveTypeA
LocalFree
GetLogicalDrives
FormatMessageA
DeleteFileA
Sleep
LeaveCriticalSection
EnterCriticalSection
CloseHandle
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
InitializeCriticalSection
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
FreeLibrary
GetProcAddress
LoadLibraryA
GetLastError
MultiByteToWideChar
LockResource
WideCharToMultiByte
ExpandEnvironmentStringsA
SizeofResource
LoadResource
FindResourceA
SetErrorMode
SetEnvironmentVariableA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
GetFileTitleA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
PIEDelete
PIEInit
PIENew
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ