Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
a8048280245e19857fbd1ae922854545_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a8048280245e19857fbd1ae922854545_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a8048280245e19857fbd1ae922854545_JaffaCakes118
Size
49KB
MD5
a8048280245e19857fbd1ae922854545
SHA1
1ed63726b4fd545e6758f3ee53eea51277a5f0dd
SHA256
76584522d03152977e8ab0b99d7bd8ad8722f2ebb402ec9711bb13a33549d71b
SHA512
602e8566a332788cc94be5f1642dbf555866845b4e1355f681901a36b49b3cd259f55db0de2672cfaa4dc2b5fd45f840b22369b38be035c4c02d496d19ff9b00
SSDEEP
768:HIpTg1X99ItftdAYyPZsUXSo4NqBzE+eiXLQrbY:MTWItftdAYyPZsU9vBzE7iX6Y
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\workarea\8.62\drivers\cal\drivers\src\api\calrt\lib\build\2k\B_rel\aticalrt.pdb
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
ExitProcess
GetModuleHandleA
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
calCtxCreate
calCtxDestroy
calCtxFlush
calCtxGetMem
calCtxIsEventDone
calCtxReleaseMem
calCtxRunProgram
calCtxRunProgramGrid
calCtxRunProgramGridArray
calCtxSetMem
calDeviceClose
calDeviceGetAttribs
calDeviceGetCount
calDeviceGetInfo
calDeviceGetStatus
calDeviceOpen
calExtGetProc
calExtGetVersion
calExtSupported
calGetErrorString
calGetVersion
calImageFree
calImageRead
calInit
calMemCopy
calModuleGetEntry
calModuleGetFuncInfo
calModuleGetName
calModuleLoad
calModuleUnload
calResAllocLocal1D
calResAllocLocal2D
calResAllocRemote1D
calResAllocRemote2D
calResFree
calResMap
calResUnmap
calShutdown
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ