Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
e05778eba48e62f9ca2b14421e81cc71_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e05778eba48e62f9ca2b14421e81cc71_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
e05778eba48e62f9ca2b14421e81cc71_JaffaCakes118
Size
347KB
MD5
e05778eba48e62f9ca2b14421e81cc71
SHA1
6638bb60503a66eb97d88c7abc89a1e556471cbc
SHA256
3ca6ca6806fee08824332a3ab71292bf957e2d994b05f50daa8d7d0c50d3c5b3
SHA512
ccc82c637b7bea3f0c4f9505aaef24a79b913a2ce5e5b2533d58b3fa7d23291bdd0782c4b1bab5ba7d472bf7fbbf976bcba2e93dff79a1c2fbde034da7647d3d
SSDEEP
6144:DekTo3MpnN7yMFf/eeDrBeMR7i1W6ULFw7RIkEEEoPd+0h78S:DekFvy2eenBeMjFw7VPbX
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\yxqxunyou\output\yxqxunyou.pdb
bind
recvfrom
recv
send
ioctlsocket
connect
select
freeaddrinfo
inet_addr
WSAGetLastError
getaddrinfo
getnameinfo
WSACleanup
WSAStartup
gethostbyname
closesocket
sendto
socket
htons
EnumProcessModules
GetModuleFileNameExW
timeGetTime
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
HeapSize
VirtualAlloc
GetCurrentProcessId
GetTickCount
GetLastError
MultiByteToWideChar
CreateFileA
GetFileSize
ReadFile
DebugBreak
OutputDebugStringW
CreateProcessW
WaitForSingleObject
OpenMutexW
CloseHandle
lstrlenA
CreateThread
GetFileAttributesExW
DeleteFileW
GetModuleFileNameW
InterlockedDecrement
lstrlenW
Sleep
InterlockedIncrement
WideCharToMultiByte
CreateFileW
OpenFileMappingA
CreateEventA
MapViewOfFile
CreateFileMappingA
SetFilePointer
SetThreadPriority
InitializeCriticalSection
OpenProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Process32FirstW
LoadLibraryW
GetProcAddress
Process32NextW
GetFileAttributesW
GetLocalTime
EnterCriticalSection
LeaveCriticalSection
CreateDirectoryW
SetLastError
WriteFile
GetPrivateProfileStringW
LoadLibraryA
FreeLibrary
VirtualFree
HeapCreate
ExitProcess
HeapDestroy
IsValidCodePage
GetOEMCP
GetTimeZoneInformation
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
GetLocaleInfoW
WriteConsoleA
GetModuleHandleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEvent
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
HeapReAlloc
GetProcessHeap
GetCommandLineA
GetCurrentThreadId
HeapAlloc
HeapFree
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
DeleteCriticalSection
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ShowWindow
EnumWindows
GetWindowThreadProcessId
EnumChildWindows
GetPropW
IsWindow
SendMessageW
LoadStringW
CharNextW
UnregisterClassA
SetForegroundWindow
PostMessageW
RegCreateKeyExW
RegDeleteValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SHGetFolderPathW
StrStrIA
StrCmpIW
PathFileExistsW
PathFileExistsA
InternetSetOptionA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetReadFile
InternetQueryDataAvailable
HttpSendRequestA
InternetOpenW
HttpQueryInfoA
xunyou_Charge
xunyou_GetAutoAccStatus
xunyou_GetGameServerSpeed
xunyou_GetNetworkCondition
xunyou_Installed
xunyou_IsInstalledNetHelper
xunyou_QueryAccStatus
xunyou_SetAutoAccStatus
xunyou_SetAutoRecordPKSpeed
xunyou_SetCallBack
xunyou_StartAccelerator
xunyou_StartAcceleratorEx
xunyou_StartNetHelper
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ