Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
adab617d2aea1409246026b115cc3a55_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
adab617d2aea1409246026b115cc3a55_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
adab617d2aea1409246026b115cc3a55_JaffaCakes118
Size
437KB
MD5
adab617d2aea1409246026b115cc3a55
SHA1
e26a64e41c508068980303ee3fe8a2511c093236
SHA256
adc4e8d9a05ede77293f01ef5bf0497201f42413793e56d8d7054a15675cc3ce
SHA512
260de358b45d749c6667784d38ac257e149e6724525798da66b0064f8f7ba64f68c1d4f8d0d858bcb584bf86ec1d2a574d4f5211630bdcb20ded71dd9e4559b7
SSDEEP
6144:eF0Qp1sv2EVXAufpWxTjvtmWDWjea8ldaBZ7B4Jwdk5:eFLsv2EVwMWhtm+ef6cB4Jqk5
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\temp\p2papp\release\p2pdata.pdb
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
CompareStringA
CompareStringW
GetTickCount
WaitForSingleObject
CloseHandle
SetEvent
ResetEvent
CreateThread
CreateEventA
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetCurrentThreadId
GetLocalTime
CopyFileA
FindClose
FindNextFileA
GetLastError
Sleep
GetDiskFreeSpaceExA
GetFileAttributesA
CreateDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
ReleaseSemaphore
CreateSemaphoreA
GetFileSize
CreateFileA
WriteFile
SetFilePointerEx
ReadFile
CreateFileW
SetEndOfFile
DeleteFileA
RemoveDirectoryA
OutputDebugStringA
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
GetCurrentProcessId
UnmapViewOfFile
GetVersionExA
MoveFileA
SetEnvironmentVariableA
GetTimeZoneInformation
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
WideCharToMultiByte
MultiByteToWideChar
FindFirstFileA
InterlockedExchange
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
VirtualFree
VirtualAlloc
GetACP
GetLocaleInfoA
GetThreadLocale
HeapAlloc
HeapFree
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetModuleHandleA
RtlUnwind
GetSystemTimeAsFileTime
ExitThread
ResumeThread
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
MoveFileW
GetCommandLineA
GetProcessHeap
LCMapStringA
LCMapStringW
GetCPInfo
ExitProcess
HeapDestroy
HeapCreate
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
GetOEMCP
IsValidCodePage
SetHandleCount
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
GetFullPathNameA
GetCurrentDirectoryA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
PostMessageA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
SHGetFolderPathA
VariantClear
??0IP2PApp@@QAE@ABV0@@Z
??0IP2PApp@@QAE@XZ
??0IP2PData@@QAE@ABV0@@Z
??0IP2PData@@QAE@XZ
??0IP2PDbg@@QAE@ABV0@@Z
??0IP2PDbg@@QAE@XZ
??1IP2PApp@@UAE@XZ
??1IP2PData@@UAE@XZ
??1IP2PDbg@@UAE@XZ
??4IP2PApp@@QAEAAV0@ABV0@@Z
??4IP2PData@@QAEAAV0@ABV0@@Z
??4IP2PDbg@@QAEAAV0@ABV0@@Z
??_7IP2PApp@@6B@
??_7IP2PData@@6B@
??_7IP2PDbg@@6B@
CreateP2PDataMgr
CreateP2PDbgMgr
DeleteP2PDataMgr
DeleteP2PDbgMgr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ