Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
d9f11990344b47dd910ed9e42079e76a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d9f11990344b47dd910ed9e42079e76a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d9f11990344b47dd910ed9e42079e76a_JaffaCakes118
Size
278KB
MD5
d9f11990344b47dd910ed9e42079e76a
SHA1
f7ee90dcc74302d8804e5f431e12001d92439f7e
SHA256
ed63bfb3dc274c097f1f62159acd129103c0eb43e1225fec9aaaa175edbae769
SHA512
be734d695d2bb8495585a4b28b7f473748bf76ed1e0fb84b37bbb91f509cb7ff7a5ad83827407ad8e9f201830aeb0f7a862d85eaf4e3af1cb2eb4339ee81c844
SSDEEP
6144:EbvrOVrzoEynZD6bcJQFBGoWL1e5SjizwJ+MLglvO6TovUyEpR:EasEynZWBgReoizwtUlW6svUx
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
f:\QQLive_Dailybuild\src\symbol\QQliveOneClick.pdb
SizeofResource
WritePrivateProfileStringW
LockResource
GetPrivateProfileStringW
LoadResource
GetVersionExW
FindResourceExW
WaitForSingleObject
GetExitCodeProcess
CreateDirectoryW
GetLastError
GetFileAttributesW
SetFileAttributesW
GetDriveTypeW
GetDiskFreeSpaceExW
FindResourceW
DeviceIoControl
GetModuleFileNameW
OutputDebugStringW
GetProcAddress
Sleep
GetSystemDirectoryW
WinExec
lstrlenW
WideCharToMultiByte
GetLogicalDrives
FindFirstFileW
DeleteFileW
GetTickCount
CreateFileW
CloseHandle
GetACP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
GetThreadLocale
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetLocaleInfoA
RegDeleteKeyW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
SHGetFolderPathW
ShellExecuteExW
CoUninitialize
CoInitialize
CoLoadLibrary
SysAllocString
SysFreeString
PathAppendW
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
__winitenv
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_invoke_watson
_controlfp_s
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
?terminate@@YAXXZ
memset
_wcsicmp
_wtoi
calloc
_recalloc
_except_handler4_common
??_U@YAPAXI@Z
memmove_s
_vscwprintf
vswprintf_s
swprintf_s
wcsncpy_s
memcpy_s
wcscat_s
rand
srand
??_V@YAXPAX@Z
??3@YAXPAX@Z
__CxxFrameHandler3
free
_CxxThrowException
?substr@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBE?AV12@II@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
?append@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@PB_W@Z
?find@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEIPB_WI@Z
?npos@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@2IB
?rfind@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEI_WI@Z
UnregisterClassA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE