Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Overview
overview
10Static
static
1Readm.md/cef.js
windows7-x64
3Readm.md/cef.js
windows10-2004-x64
3Readm.md/c...ent.js
windows7-x64
3Readm.md/c...ent.js
windows10-2004-x64
3Readm.md/c...ent.js
windows7-x64
3Readm.md/c...ent.js
windows10-2004-x64
3Readm.md/c...lf.dll
windows7-x64
3Readm.md/c...lf.dll
windows10-2004-x64
3Readm.md/w...11.dll
windows7-x64
3Readm.md/w...11.dll
windows10-2004-x64
3lnstaIIer .x64.exe
windows7-x64
1lnstaIIer .x64.exe
windows10-2004-x64
10Static task
static1
Behavioral task
behavioral1
Sample
Readm.md/cef.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Readm.md/cef.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Readm.md/cef_100_percent.js
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Readm.md/cef_100_percent.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Readm.md/cef_200_percent.js
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Readm.md/cef_200_percent.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Readm.md/chrome_elf.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Readm.md/chrome_elf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Readm.md/wow64/YandexDisk3ShellExt-1511.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Readm.md/wow64/YandexDisk3ShellExt-1511.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
lnstaIIer .x64.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
lnstaIIer .x64.exe
Resource
win10v2004-20241007-en
Target
JaffaCakes118_f9fb6b9d26ac58275073ff1c451011b6377d67e9b72ae04dbb36351b966b8333
Size
9.1MB
MD5
faeeb8df1865c90313c40f873e1831d4
SHA1
74e8f79de6e9e9fdd070cff08e8512691ea21a84
SHA256
f9fb6b9d26ac58275073ff1c451011b6377d67e9b72ae04dbb36351b966b8333
SHA512
1ac15a481ead109af7479e2dedbf8277d20ed4bbc3da87f0e5ddc6cf388fe1faac7d7916bb2aa706d9c189513e7bd93c287663d9eb1aa94687dbd16110d92da3
SSDEEP
196608:ggkR/EDkX4m+TrE1RHSHkOdm3CEEP5iZ5vDy8BDyFMD2:ggkR8Dn8RHqkOq5EP56vemDyr
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Y:\work\CEF3_git\chromium\src\out\Release_GN_x86\chrome_elf.dll.pdb
VerSetConditionMask
GetModuleHandleW
GetProcAddress
VerifyVersionInfoW
LoadLibraryExA
ReadConsoleW
VirtualProtect
GetCurrentProcessId
GetProcessId
GetCommandLineW
GetTempPathW
GetModuleFileNameW
GetLastError
GetCurrentProcess
VirtualQuery
GetEnvironmentVariableW
GetNativeSystemInfo
SetEnvironmentVariableW
CreateDirectoryW
GetFileAttributesW
OutputDebugStringW
MultiByteToWideChar
WideCharToMultiByte
GetComputerNameExW
FreeLibrary
LoadLibraryW
ReadProcessMemory
WriteProcessMemory
GetModuleHandleExW
CreateFileW
CloseHandle
VirtualProtectEx
HeapCreate
HeapDestroy
Sleep
QueryPerformanceFrequency
GetSystemTimeAsFileTime
QueryPerformanceCounter
SetLastError
WaitForSingleObject
GetCurrentThreadId
RaiseException
CreateThread
IsDebuggerPresent
WriteFile
DeleteFileW
GetLocalTime
GetCurrentDirectoryW
FormatMessageA
GetTickCount
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TerminateProcess
OpenProcess
CreateEventW
SetEvent
ResetEvent
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
ReadFile
GetFileSizeEx
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetSystemInfo
FindClose
CreateRemoteThread
GetStdHandle
GetFileType
SleepEx
CreateProcessW
GetVersion
LockFileEx
UnlockFileEx
InitializeCriticalSection
SetNamedPipeHandleState
TransactNamedPipe
CreateNamedPipeW
WaitNamedPipeW
GetUserDefaultLCID
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
LCMapStringW
GetLocaleInfoW
GetCPInfo
WaitForSingleObjectEx
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
RtlUnwind
LoadLibraryExW
InterlockedFlushSList
GetFullPathNameW
GetConsoleCP
GetConsoleMode
ExitProcess
SetStdHandle
SetConsoleCtrlHandler
GetModuleFileNameA
GetACP
IsValidLocale
EnumSystemLocalesW
GetDriveTypeW
WriteConsoleW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
AddDllToBlacklist
ClearCrashKeyValueImpl
CrashForException
DumpProcessWithoutCrash
GetBlacklistIndex
GetCrashKeyCountImpl
GetCrashKeyImpl
GetCrashReportsImpl
GetHandleVerifier
GetInstallDetailsPayload
GetUserDataDirectoryThunk
InjectDumpForHangDebugging
InjectDumpForHungInput
InjectDumpForHungInputNoCrashKeys
InjectDumpProcessWithoutCrash
IsBlacklistInitialized
RequestSingleCrashUploadImpl
SetCrashKeyValueImpl
SetMetricsClientId
SetUploadConsentImpl
SignalChromeElf
SignalInitializeCrashReporting
SuccessfullyBlocked
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\BuildAgent\work\che-trunk-git-yandex-ru\win\YandexDiskUploader\Release\YandexDisk3ShellExt.pdb
lstrcmpiW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
GetThreadLocale
SetThreadLocale
EncodePointer
EnterCriticalSection
LeaveCriticalSection
VerSetConditionMask
VerifyVersionInfoW
LoadLibraryW
SetErrorMode
DeleteFileW
GetLocalTime
MoveFileW
GetFileSize
FlushFileBuffers
SetFilePointer
WriteFile
CreateFileW
InitializeCriticalSection
InterlockedFlushSList
RtlUnwind
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
LocalFree
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
HeapDestroy
GetProcessHeap
GetFileAttributesW
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetUserDefaultUILanguage
CallNamedPipeW
CreateMutexW
GetCurrentProcess
CloseHandle
CreateProcessW
DecodePointer
GetProcAddress
GetModuleHandleW
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
GlobalUnlock
GlobalLock
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
GetLastError
QueryPerformanceCounter
FindNextFileA
FindFirstFileExA
FindClose
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
GetStdHandle
GetACP
GetModuleFileNameA
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
ExitProcess
GetModuleHandleExW
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
RaiseException
GetVersionExW
LCMapStringW
CompareStringW
VirtualQuery
VirtualProtect
VirtualAlloc
IsDebuggerPresent
OutputDebugStringW
GetStringTypeW
SetLastError
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetSystemInfo
DestroyMenu
GetSystemMetrics
InsertMenuW
LoadImageW
InsertMenuItemW
CharNextW
DestroyIcon
DrawIconEx
GetIconInfo
SetBkColor
ExtTextOutW
GetDIBits
CreateDIBSection
SelectObject
DeleteDC
DeleteObject
CreateCompatibleDC
RegDeleteKeyW
GetTokenInformation
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
CopySid
RegDeleteValueW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
OpenProcessToken
IsValidSid
GetLengthSid
ConvertSidToStringSidW
DragQueryFileW
SHGetDesktopFolder
SHGetFileInfoW
ord165
SHGetFolderPathW
ord155
ord18
CoCreateInstance
ReleaseStgMedium
CoTaskMemRealloc
CoTaskMemAlloc
StringFromGUID2
CoTaskMemFree
SysFreeString
LoadTypeLi
SysAllocString
UnRegisterTypeLi
RegisterTypeLi
SysStringLen
VarUI4FromStr
PathFileExistsW
ImageList_Merge
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_Destroy
ImageList_Create
AlphaBlend
UnloadUserProfile
GdiplusStartup
GdiplusShutdown
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateSemaphoreW
CreateThread
DeleteCriticalSection
EnterCriticalSection
FreeConsole
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentProcessorNumber
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
QueryPerformanceCounter
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
GetSystemTimeAsFileTime
CreateEventA
GetModuleFileNameW
GetModuleHandleA
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
LoadLibraryA
FreeLibrary
GetTickCount
SystemTimeToFileTime
FileTimeToSystemTime
GlobalFree
LocalAlloc
LocalFree
GetProcAddress
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
MultiByteToWideChar
GetModuleHandleW
LoadResource
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
GetLastError
FlushFileBuffers
WriteConsoleW
SetStdHandle
IsProcessorFeaturePresent
DecodePointer
GetCommandLineA
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
RaiseException
LCMapStringW
GetStringTypeW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapSize
WriteFile
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapReAlloc
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
___mb_cur_max_func
__doserrno
__getmainargs
__initenv
__lconv_init
__p__acmdln
__p__fmode
__pioinfo
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_errno
_fdopen
_filelengthi64
_fileno
_fileno
_fstat64
_initterm
_iob
_lseeki64
_onexit
_read
_strnicmp
_write
_write
abort
atoi
calloc
exit
fclose
fflush
fgetpos
fopen
fprintf
fputc
fputs
fread
free
fsetpos
fwrite
getc
getwc
isspace
iswctype
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
putc
putwc
realloc
setlocale
setvbuf
signal
sprintf
strchr
strcmp
strcoll
strerror
strftime
strlen
strncmp
strtoul
strxfrm
towlower
towupper
ungetc
ungetwc
vfprintf
wcscoll
wcsftime
wcslen
wcsxfrm
AppendMenuA
CreatePopupMenu
GetDlgItem
SendDlgItemMessageA
CharUpperBuffW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ