Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
8344413aa3b067854f5e4b114ee446db_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8344413aa3b067854f5e4b114ee446db_JaffaCakes118.dll
Resource
win10v2004-20240730-en
Target
8344413aa3b067854f5e4b114ee446db_JaffaCakes118
Size
637KB
MD5
8344413aa3b067854f5e4b114ee446db
SHA1
18f9776068a170c2af581c867b0949385ddbf515
SHA256
1f0321768ba830023451fa9cac1532e0965f9b4bcdcc7054980540b66c746d09
SHA512
00f67b0f6db096b64770409bc5d8758146041fdccc68eceffa05f306e1b5fcad4852ecbb100ee113de7fe59209fec32c9d6bdde87846b63b5591d6a5fb780616
SSDEEP
6144:XoDrVboD2OY0uy7sDzjCzWonZtC3CGBBlbheWndsKMHT2fKQFt5mXOQckbVjQedT:4rVMDQwu6zWkSsHivOckZked47zdZm
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\Documents and Settings\Timothy\My Documents\WorkCode\SpyFrame\trunk\release\SpyCleaner.pdb
Tcl_EvalEx
Tcl_CreateCommand
Tcl_SetResult
Tcl_SplitList
Tcl_FreeList
GetFileTime
FileTimeToSystemTime
GetModuleFileNameA
GetSystemInfo
GetVersionExA
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
LocalAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
GetThreadLocale
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
FileTimeToLocalFileTime
GlobalGetAtomNameA
GetModuleFileNameW
InterlockedDecrement
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetCurrentThreadId
WaitForSingleObject
SetErrorMode
InterlockedIncrement
lstrcmpA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
CopyFileA
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualAlloc
VirtualQuery
HeapReAlloc
GetCommandLineA
GetSystemTimeAsFileTime
ExitProcess
RtlUnwind
SetStdHandle
GetFileType
HeapSize
GetACP
IsValidCodePage
GetStdHandle
GetStartupInfoA
LCMapStringA
LCMapStringW
VirtualFree
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
SetEnvironmentVariableA
TerminateProcess
RaiseException
WritePrivateProfileStringA
GetWindowsDirectoryA
GetModuleHandleA
SetFilePointer
WriteFile
ReadFile
GetProcessHeap
FindClose
FindNextFileA
GetFileAttributesA
FindFirstFileA
GetBinaryTypeA
CreateDirectoryA
GetFileSize
CreateFileA
QueryDosDeviceA
OpenProcess
GetCurrentProcessId
MoveFileExA
SetFileAttributesA
InterlockedExchange
CompareStringW
CompareStringA
lstrlenA
DeleteCriticalSection
GetCurrentProcess
GetVersion
Module32Next
Module32First
LocalFree
Sleep
Process32Next
FormatMessageA
Process32First
CreateToolhelp32Snapshot
DeleteFileA
SetLastError
GetDriveTypeA
GetLogicalDrives
LeaveCriticalSection
EnterCriticalSection
CloseHandle
GetFullPathNameA
MoveFileA
CreateIoCompletionPort
InitializeCriticalSection
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
FreeLibrary
GetProcAddress
LoadLibraryA
GetLastError
MultiByteToWideChar
ExpandEnvironmentStringsA
SizeofResource
LoadResource
FindResourceA
LockResource
WideCharToMultiByte
SetHandleCount
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
PIEDelete
PIEInit
PIENew
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ