Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
de5b8a4a3590f81706553eb53aafdc94_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de5b8a4a3590f81706553eb53aafdc94_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
de5b8a4a3590f81706553eb53aafdc94_JaffaCakes118
Size
77KB
MD5
de5b8a4a3590f81706553eb53aafdc94
SHA1
1852a8825660d6e03a664f55e126ed05dad232fa
SHA256
7723af9d840b97ef2d436e10cf8b5db0b5edbb76276ab89696cd07e9cec4ffd7
SHA512
49942db38f6d33e672ac7f27a6d5fb3dce95b360187775d26b2ba9aa27694150b07f8ea17babdfce4f08e5509d6cbaeb9304ad8cea09bea9e3e6b456fee3688d
SSDEEP
1536:pwMv7D0X0l1kzCO+DZCG4gx3lIp2sB4fnToIfacIOZ2GkOgGidxa7C3:6EdRTx3lm2sB4vTBfaSZ2GkOgGiCO
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
e:\qqpcmgr_proj\QQPCMgr_Public\Basic\Output\BinFinal\PatchAgent.pdb
PathAddBackslashW
PathAppendW
PathRemoveFileSpecW
PathQuoteSpacesW
StrStrIW
PathFileExistsW
PathFindExtensionW
lstrcmpiW
CreateProcessW
Sleep
TerminateProcess
CopyFileW
CloseHandle
DisableThreadLibraryCalls
GetCurrentProcess
ReadFile
GetFileSize
CreateFileW
GetLastError
GetSystemDirectoryW
DeviceIoControl
GetCurrentDirectoryW
GetTickCount
GetCurrentProcessId
Process32NextW
HeapFree
GetProcessHeap
HeapAlloc
GetModuleHandleW
GetProcAddress
GetModuleFileNameW
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
InitializeCriticalSection
EnterCriticalSection
DeleteCriticalSection
UnmapViewOfFile
ExpandEnvironmentStringsW
Process32FirstW
WaitForSingleObject
CreateToolhelp32Snapshot
OpenProcess
LeaveCriticalSection
HeapSize
HeapReAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
SendMessageTimeoutW
FindWindowA
SendMessageW
FindWindowExW
FindWindowW
GetClientRect
ControlService
OpenSCManagerW
CloseServiceHandle
OpenServiceW
StartServiceW
CreateServiceW
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
RegCreateKeyW
RegCloseKey
RegSetValueExW
InitializeSecurityDescriptor
SHCreateDirectoryExW
_encode_pointer
_malloc_crt
_encoded_null
_decode_pointer
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_unlock
__dllonexit
_lock
_onexit
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__clean_type_info_names_internal
_except_handler4_common
free
wcsstr
_CxxThrowException
_snwprintf
_vscwprintf
memmove_s
??3@YAXPAX@Z
_invalid_parameter_noinfo
_wcsicmp
??_U@YAPAXI@Z
vswprintf_s
wcsncpy_s
??_V@YAXPAX@Z
wcsrchr
wcsncat_s
setlocale
memcpy
memset
__CxxFrameHandler3
memcpy_s
?append@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@I_W@Z
?rbegin@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE?AV?$reverse_iterator@V?$_String_iterator@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@@2@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
?clear@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEXXZ
EndCopyFile
EndPatch
EndRollback
EndRollbackFile
StartCopyFile
StartPatch
StartRollback
StartRollbackFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ