Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
45c7fab70dc96856a3b8dd73f7172381_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
45c7fab70dc96856a3b8dd73f7172381_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
45c7fab70dc96856a3b8dd73f7172381_JaffaCakes118
Size
13.1MB
MD5
45c7fab70dc96856a3b8dd73f7172381
SHA1
16a1b64c8bb6463890317dca8f290ccc31be5405
SHA256
6d35f60409096de49a34c847b16dbb51b0fad67b4c4885a4702964d48cfb5a93
SHA512
6c34b0d43b026cb648e24a1a88051a7447120e99936327f4a37ced269ecf580ab0c22f20cd615670b3d9b9cdde170c4033dd5e0f451e37e424f0917c60665e4b
SSDEEP
49152:H8GNFC7YwBpD9vnIV43u7w9VFZnpu+2RJlieGF:cGNFCEIXIVxUFNpuBRJlieGF
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\Documents and Settings\Timothy\My Documents\WorkCode\AntiSpwareBot\trunk\release\AntiSpywareBot.pdb
GlobalFindAtomA
GlobalGetAtomNameA
MoveFileA
GetThreadLocale
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
LocalAlloc
SetFileAttributesA
InterlockedIncrement
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
GetTempFileNameA
RtlUnwind
VirtualProtect
VirtualAlloc
VirtualQuery
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
lstrcmpW
IsDebuggerPresent
ExitThread
GetTimeFormatA
GetDateFormatA
SetEnvironmentVariableA
SetStdHandle
GetFileType
GetSystemTimeAsFileTime
ExitProcess
RaiseException
HeapSize
GetACP
IsValidCodePage
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLogicalDriveStringsA
lstrcatA
Module32First
Module32Next
GetSystemDirectoryA
GetLogicalDrives
GetBinaryTypeA
GetCurrentProcessId
GlobalAddAtomA
SuspendThread
SetThreadPriority
InterlockedDecrement
GetModuleFileNameW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
SetCurrentDirectoryA
lstrcpyA
TerminateThread
SetLastError
WinExec
CreateFileA
SystemTimeToFileTime
DeleteFileA
lstrcpynA
FileTimeToLocalFileTime
GetFileAttributesA
FindNextFileA
RemoveDirectoryA
FreeLibrary
LoadLibraryA
CreateProcessA
SearchPathA
ExpandEnvironmentStringsA
LocalFree
ReadFile
FormatMessageA
FileTimeToSystemTime
GetFileTime
GetCurrentProcess
GetTempPathA
GetSystemInfo
CreateThread
FindClose
FindFirstFileA
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetSystemTime
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
FlushFileBuffers
WriteFile
GetVersionExA
TerminateProcess
GetLocalTime
Sleep
InitializeCriticalSection
GetModuleFileNameA
SetConsoleScreenBufferSize
GetStdHandle
LeaveCriticalSection
GetConsoleScreenBufferInfo
EnterCriticalSection
AllocConsole
DeleteCriticalSection
FreeConsole
CreateDirectoryA
GlobalFree
SetEvent
MulDiv
GlobalUnlock
GlobalLock
ResetEvent
GetWindowsDirectoryA
CreateEventA
GlobalAlloc
CloseHandle
ResumeThread
WaitForSingleObject
GetProcAddress
FreeResource
GetModuleHandleA
GetEnvironmentVariableA
lstrlenA
CompareStringW
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SetUnhandledExceptionFilter
SizeofResource
MessageBeep
SetCapture
CharNextA
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
RegisterClipboardFormatA
PostThreadMessageA
UnregisterClassA
SetWindowContextHelpId
MapDialogRect
DestroyMenu
InflateRect
RegisterWindowMessageA
WinHelpA
IsChild
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
AdjustWindowRectEx
PtInRect
DefWindowProcA
CallWindowProcA
OffsetRect
IntersectRect
GetWindowPlacement
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxA
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
EnableMenuItem
CheckMenuItem
GetKeyState
EndPaint
BeginPaint
GrayStringA
DrawTextExA
TabbedTextOutA
UnhookWindowsHookEx
GetWindowTextLengthA
GetWindowTextA
GetFocus
SetFocus
IsWindowEnabled
ShowWindow
MoveWindow
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetWindow
PostQuitMessage
GetMenuState
GetMenuItemID
CopyIcon
GetCaretPos
ExitWindowsEx
LoadBitmapA
RedrawWindow
GetMenuItemCount
PeekMessageA
DispatchMessageA
TranslateMessage
GetSysColorBrush
SystemParametersInfoA
SetWindowPos
DrawTextA
GetWindowDC
ScreenToClient
ModifyMenuA
SetTimer
SendMessageA
CharUpperA
EnableWindow
PostMessageA
GetWindowRect
CopyRect
LoadMenuA
SetForegroundWindow
GetSubMenu
GetWindowLongA
SetWindowLongA
SetRect
GetCursorPos
GetDC
ReleaseDC
GetParent
HideCaret
SetWindowRgn
GetClientRect
InvalidateRect
LoadImageA
KillTimer
FillRect
LoadCursorA
GetSysColor
DestroyCursor
SetCursor
SetClassLongA
ClientToScreen
ReleaseCapture
GetCapture
WindowFromPoint
DrawEdge
DrawFocusRect
LoadIconA
IsIconic
DrawIcon
IsWindow
EqualRect
GetDesktopWindow
FindWindowA
GetSystemMetrics
TrackMouseEvent
RegisterClassA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreateBitmap
TextOutA
CreateRectRgnIndirect
GetTextExtentPoint32A
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
PtVisible
RectVisible
GetObjectA
GetViewportExtEx
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetDIBits
CreateFontIndirectA
ExtTextOutA
GetTextMetricsA
SelectClipRgn
StretchBlt
SelectObject
GetDeviceCaps
DeleteDC
Rectangle
CombineRgn
DeleteObject
ExtCreateRegion
GetStockObject
CreateRectRgn
CreateSolidBrush
GetPixel
CreatePatternBrush
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetWindowExtEx
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ord17
_TrackMouseEvent
SHDeleteKeyA
UrlUnescapeA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathIsDirectoryA
PathFileExistsA
ord8
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoUninitialize
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemFree
StgOpenStorageOnILockBytes
CoInitializeEx
SysAllocString
OleCreateFontIndirect
OleLoadPicture
VariantTimeToSystemTime
SystemTimeToVariantTime
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
InternetQueryDataAvailable
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ