Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
b621804eb3009fc4607357b8999bcc41_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b621804eb3009fc4607357b8999bcc41_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b621804eb3009fc4607357b8999bcc41_JaffaCakes118
Size
81KB
MD5
b621804eb3009fc4607357b8999bcc41
SHA1
4dc537e6398044897769ceb9c001cd15c2d1c3f1
SHA256
0af9aad799f3d076e0f62806b949589169133d6b265193580bf9e1e5619cf445
SHA512
9ba1cadef58a991c4ac99f2ab4ce2a220244162e2b2e1a8b40c1b693424b777f39b097820c31d5db6a2d6a250a7fbdc8fb098755df06926337280555d85c537e
SSDEEP
1536:/yoA+cEztnsAOU0VfeZBGcMb27rznYn6win3cQk7Qaa3UO3paQCeB:Xc4NsAOU0VfeZBzr3JEO
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\workspace\xiaobai.new\client\trunk\tools\tao123_SetupOL\release\tao123_SetupOL.pdb
ord566
ord777
ord265
ord1197
ord280
ord577
ord774
ord283
ord896
ord899
ord3842
ord1479
ord2260
ord282
ord5524
ord776
ord6161
ord6700
ord4100
ord1472
ord266
ord3990
ord764
ord762
ord757
ord293
_configthreadlocale
_initterm_e
_initterm
__winitenv
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_snwprintf_s
_wstrtime_s
_wremove
_vsnwprintf_s
_wstrdate_s
_wrename
__setusermatherr
wcsncpy
_invalid_parameter_noinfo
wprintf
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
wcsrchr
wcsncmp
swprintf_s
??0exception@std@@QAE@ABV01@@Z
fclose
vswprintf_s
fread
_wfopen
_time64
strncpy_s
strchr
__CxxFrameHandler3
memset
_CxxThrowException
_adjust_fdiv
strrchr
strcpy_s
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_unlock
__dllonexit
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_vsnwprintf
_lock
memcpy
GetTempPathW
GetTempFileNameW
DeleteFileW
GetPrivateProfileStringW
CreateFileW
GetFileSize
GetCommandLineW
CloseHandle
GetModuleHandleW
WideCharToMultiByte
WriteFile
GetModuleFileNameW
FindFirstFileW
GetModuleFileNameA
GetProcessHeap
InterlockedDecrement
lstrlenW
FormatMessageW
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
OutputDebugStringW
MoveFileW
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
GetPrivateProfileIntW
SetFilePointer
FindClose
wsprintfW
SendMessageW
LoadAcceleratorsW
ShellExecuteW
SHCreateDirectoryExW
CoCreateInstance
CoUninitialize
CoInitialize
OleRun
VariantClear
SysAllocString
SysFreeString
GetErrorInfo
URLDownloadToFileW
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ