Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
b89c24891dd9a67f263a594ccc1e58ee_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b89c24891dd9a67f263a594ccc1e58ee_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b89c24891dd9a67f263a594ccc1e58ee_JaffaCakes118
Size
245KB
MD5
b89c24891dd9a67f263a594ccc1e58ee
SHA1
8dd0e546eddfd6dc0b9dd51468f2ad226d4f4448
SHA256
18c4fec7fd202fbd038dafe4dc55df812dc23bb582fdda6530585290513e2e5d
SHA512
89ee93e97b4bb231289495b177c37bc80e7a15867644858c483eb5cf285c2d3abe636e7786a8d134bd8c1164217db239bafda5c1c065e3cc4999ad693ef167ef
SSDEEP
6144:to9YPs7IPsgVlibAYjdybQZHmgrYFc1fU/3O4O0qjOA2PF:toVMFBG71M/e4OPSF
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
f:\qqpcmgr_proj\2374\Basic\Output\BinFinal\QMScriptHost.pdb
GetModuleFileNameW
GetLastError
LeaveCriticalSection
InterlockedIncrement
GetThreadLocale
GetProcAddress
DeleteCriticalSection
FindResourceExW
MultiByteToWideChar
FindResourceW
WideCharToMultiByte
LockResource
LoadResource
SizeofResource
CloseHandle
InitializeCriticalSection
FlushFileBuffers
WriteFile
SetFilePointer
ReadFile
SetEndOfFile
LocalFree
GetModuleFileNameA
LoadLibraryA
FreeLibrary
FormatMessageA
lstrlenA
GetModuleHandleW
VirtualAlloc
GetSystemInfo
Sleep
GetProcessHeap
RaiseException
SetThreadLocale
EnterCriticalSection
CreateFileW
InterlockedDecrement
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
GetLocaleInfoA
GetACP
InterlockedExchange
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
GetCurrentProcessId
CharNextW
UnregisterClassA
RegCloseKey
RegOpenKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
CommandLineToArgvW
CoCreateInstance
StringFromGUID2
SafeArrayGetElement
SafeArrayGetDim
VarCmp
VariantChangeType
VariantClear
VariantInit
SafeArrayDestroy
SysAllocStringLen
SafeArrayCreate
SysFreeString
SafeArrayGetUBound
VariantCopy
SafeArrayGetLBound
SafeArrayCopy
SafeArrayGetVartype
SafeArrayLock
SafeArrayUnlock
SysAllocString
LoadTypeLi
RegisterTypeLi
SysStringLen
UnRegisterTypeLi
memcpy
_setjmp3
_CIpow
floor
__CxxFrameHandler3
_CxxThrowException
_CIexp
_CIlog10
??3@YAXPAX@Z
wcsncpy_s
free
wcscpy_s
??_V@YAXPAX@Z
wcscat_s
calloc
memmove_s
memcpy_s
malloc
??_U@YAPAXI@Z
_purecall
??2@YAPAXI@Z
clock
clearerr
fscanf
localeconv
rand
toupper
_pclose
tmpfile
remove
strtod
_CIlog
strerror
rename
isalnum
srand
longjmp
_mktime64
isdigit
feof
ispunct
strncat
freopen
fputs
ungetc
strftime
strcoll
strstr
strcspn
tolower
realloc
islower
__iob_func
_gmtime64
setlocale
frexp
tmpnam
strncpy
strtoul
fgets
_localtime64
strchr
isupper
_HUGE
fopen
fseek
memchr
getenv
fflush
strpbrk
setvbuf
fclose
ceil
_snprintf
ferror
isxdigit
isalpha
getc
_popen
iscntrl
modf
system
fread
fwrite
ldexp
_errno
fprintf
_difftime64
isspace
strrchr
_time64
_resetstkoflw
strcpy_s
memset
?terminate@@YAXXZ
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__clean_type_info_names_internal
_CIsqrt
_CIfmod
_CIatan2
_CIatan
_CIacos
_CIasin
_CItanh
_CItan
_CIcosh
_CIcos
_CIsinh
ftell
_CIsin
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ