Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
b9cc9e2ef833e7cc4807f76f99f42fcf_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9cc9e2ef833e7cc4807f76f99f42fcf_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b9cc9e2ef833e7cc4807f76f99f42fcf_JaffaCakes118
Size
20KB
MD5
b9cc9e2ef833e7cc4807f76f99f42fcf
SHA1
185352e7983ce639619adba95ce9d7ad620b68cd
SHA256
18e3a1d778c1bc36b34f9a533112c3562818ab9ad2490e862229ada111d3da28
SHA512
ec6191b807d659d00ba4072ae5273a7d5f947ef98ae0a795649c123aedafa4465d666a4bf16bc33e1f8b9d0e8876c9544d4bacc91e97977606f953143902ac37
SSDEEP
384:/1kQ3Wgr38ysQSbQpSEsMAC26GnpMqOgfE6BR0Gkk8teTjLuu9YJLu1vPbCz3q:/JQQpeC7GpNOgffklOmuoLWHbC7q
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
f:\qqpcmgr_proj\QQPCMgr_Beijing_BaseTrunk\Basic\Output\BinFinal\plugins\QMArpRtpPlugin.pdb
ord1200
ord314
ord1170
ord1168
ord1192
ord1115
ord1162
ord1908
ord371
ord1093
ord1199
ord1197
ord764
ord1087
ord1033
ord1079
ord315
ord765
ord6751
ord293
ord577
ord762
ord581
_encoded_null
free
_malloc_crt
_decode_pointer
_initterm
memset
wcsncat_s
wcslen
_snwprintf_s
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
?terminate@@YAXXZ
__clean_type_info_names_internal
_crt_debugger_hook
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invalid_parameter_noinfo
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
__CxxFrameHandler3
wcsncpy_s
fclose
fread
_wfopen_s
Sleep
CreateProcessW
WaitForSingleObject
CreateEventW
GetModuleFileNameW
LocalAlloc
InterlockedExchange
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
LocalFree
SHGetSpecialFolderPathW
PathRemoveFileSpecW
PathFileExistsW
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
TRLoad
TRPluginInfo
TRTSComInterface
TRUnload
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ