Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
c0b0b062b5769ae09674ac65eaf83f8c_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c0b0b062b5769ae09674ac65eaf83f8c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c0b0b062b5769ae09674ac65eaf83f8c_JaffaCakes118
Size
669KB
MD5
c0b0b062b5769ae09674ac65eaf83f8c
SHA1
2ef90a4e0eb766bb37ec220a8caabcfcf02a0237
SHA256
ae821d01449eff54ecd392ba990952c7d721be22605297344393baf69bd92f81
SHA512
1e5b1a5af91cb268f22c71aacc81baaa57acfc4b6b89024cad1f65faad833a226d5201ce96d2e8cebb57855db26caa79b0f0a4b543e906d43879d857cc2461ba
SSDEEP
12288:ztXs19nDIcpdtvz7DaafGFv33yyoXBx17U:xXKnDIQdt7GV3iJXh7U
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\Documents and Settings\Timothy\My Documents\WorkCode\SpyFrame\trunk\release\SpyCleaner.pdb
Tcl_EvalEx
Tcl_CreateCommand
Tcl_SetResult
Tcl_SplitList
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VirtualAlloc
VirtualFree
TlsAlloc
TlsSetValue
TlsGetValue
TlsFree
GetWindowsDirectoryA
WritePrivateProfileStringA
GetModuleHandleA
TerminateProcess
CopyFileA
GetModuleFileNameA
GetFileTime
FileTimeToSystemTime
GetSystemInfo
GetVersionExA
RaiseException
GetStdHandle
GetLocalTime
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
GetThreadLocale
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetCurrentThreadId
WaitForSingleObject
FileTimeToLocalFileTime
GlobalGetAtomNameA
GetModuleFileNameW
InterlockedDecrement
GlobalReAlloc
GlobalHandle
LocalReAlloc
SetErrorMode
lstrcmpA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualQuery
HeapReAlloc
GetCommandLineA
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
SetEnvironmentVariableA
RtlUnwind
HeapSize
GetACP
IsValidCodePage
SetHandleCount
GetStartupInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
FlushFileBuffers
LocalAlloc
SetFilePointer
WriteFile
ReadFile
SetLastError
GetBinaryTypeA
CreateDirectoryA
QueryDosDeviceA
GetFileSize
CreateFileA
OpenProcess
GetCurrentProcessId
MoveFileExA
SetFileAttributesA
GetProcessHeap
FindClose
FindNextFileA
GetFileAttributesA
FindFirstFileA
GetCurrentProcess
GetVersion
InterlockedExchange
CompareStringW
CompareStringA
lstrlenA
DeleteCriticalSection
MoveFileA
GetDriveTypeA
CreateIoCompletionPort
GetLogicalDrives
LocalFree
FormatMessageA
Sleep
DeleteFileA
LeaveCriticalSection
EnterCriticalSection
CloseHandle
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
InitializeCriticalSection
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
FreeLibrary
GetProcAddress
LoadLibraryA
GetLastError
MultiByteToWideChar
LockResource
WideCharToMultiByte
ExpandEnvironmentStringsA
SizeofResource
LoadResource
FindResourceA
InterlockedIncrement
ExitProcess
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
GetFileTitleA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
PIEDelete
PIEInit
PIENew
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ