Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
73a4bb6269b37b2b5a8aeb68fa789742_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
73a4bb6269b37b2b5a8aeb68fa789742_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
73a4bb6269b37b2b5a8aeb68fa789742_JaffaCakes118
Size
437KB
MD5
73a4bb6269b37b2b5a8aeb68fa789742
SHA1
0e537418af093b8ff5eca9268cffa8f894f9b283
SHA256
453219950d4f08c93a860d04149439a2900ca41ca3b658d7fb4846940aa90bac
SHA512
98b716b4988121c18b61f47b5d01ee0d9ae3cd73d4ee79fb87e57b6271680f804571d88bb862297f9ee11c8a03325406e527ce6b061bc794837ef38ab7a5edff
SSDEEP
6144:DvsQp9WkmWX9dCYym8hGyfghRXpsLtJDsjLMN1JlFHU5/u1HHy:DvvWkmWX9IYyhGycRXuLLYLMjnVOuJy
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\temp\p2papp\release\p2pdata.pdb
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
CompareStringA
CompareStringW
GetTickCount
WaitForSingleObject
CloseHandle
SetEvent
ResetEvent
CreateThread
CreateEventA
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetCurrentThreadId
GetLocalTime
CopyFileA
FindClose
FindNextFileA
GetLastError
Sleep
GetDiskFreeSpaceExA
GetFileAttributesA
CreateDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
ReleaseSemaphore
CreateSemaphoreA
GetFileSize
CreateFileA
WriteFile
SetFilePointerEx
ReadFile
CreateFileW
SetEndOfFile
DeleteFileA
RemoveDirectoryA
OutputDebugStringA
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
GetCurrentProcessId
UnmapViewOfFile
GetVersionExA
MoveFileA
SetEnvironmentVariableA
GetTimeZoneInformation
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
WideCharToMultiByte
MultiByteToWideChar
FindFirstFileA
InterlockedExchange
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
VirtualFree
VirtualAlloc
GetACP
GetLocaleInfoA
GetThreadLocale
HeapAlloc
HeapFree
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetModuleHandleA
RtlUnwind
GetSystemTimeAsFileTime
ExitThread
ResumeThread
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
MoveFileW
GetCommandLineA
GetProcessHeap
LCMapStringA
LCMapStringW
GetCPInfo
ExitProcess
HeapDestroy
HeapCreate
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
GetOEMCP
IsValidCodePage
SetHandleCount
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
GetFullPathNameA
GetCurrentDirectoryA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
PostMessageA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
SHGetFolderPathA
VariantClear
??0IP2PApp@@QAE@ABV0@@Z
??0IP2PApp@@QAE@XZ
??0IP2PData@@QAE@ABV0@@Z
??0IP2PData@@QAE@XZ
??0IP2PDbg@@QAE@ABV0@@Z
??0IP2PDbg@@QAE@XZ
??1IP2PApp@@UAE@XZ
??1IP2PData@@UAE@XZ
??1IP2PDbg@@UAE@XZ
??4IP2PApp@@QAEAAV0@ABV0@@Z
??4IP2PData@@QAEAAV0@ABV0@@Z
??4IP2PDbg@@QAEAAV0@ABV0@@Z
??_7IP2PApp@@6B@
??_7IP2PData@@6B@
??_7IP2PDbg@@6B@
CreateP2PDataMgr
CreateP2PDbgMgr
DeleteP2PDataMgr
DeleteP2PDbgMgr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ